Research and Implementation of Anomaly Detection Algorithm in Data Mining

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (7. : 2021 : Dublin) Artificial intelligence and security ; Part 2
1. Verfasser: Zhou, Yang (VerfasserIn)
Weitere Verfasser: Liu, Fazhou (VerfasserIn), Li, Shan (VerfasserIn), Guo, Chao (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Graph Attention Network for Word Embeddings 2021 Long, Yunfei
A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring 2021 Zhou, Chunru
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Ranking 2021 Li, Xiehua
Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue Architecture 2021 Li, Shunbin
Covert Communication via Modulating Soft Label of Neural Network 2021 Liu, Gen
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes 2021 Yu, Xuanang
Recent Development, Trends and Challenges in IoT Security 2021 Talezari, Morteza
Performance Comparison of Curve Fitting and Compressed Sensing in Channel State Information Feature Extraction 2021 Wang, Xiaolong
Energy Optimization for Wild Animal Tracker Basing on Watchdog Technology 2021 Xu, Zhenggang
Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method 2021 Lai, Zhimao
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing 2021 Yu, Zhaofeng
Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis 2021 He, Si Yuan
Firewall Filtering Technology and Application Based on Decision Tree 2021 Jin, Yujie
A Computing Task Offloading Scheme for Mobile Edge Computing 2021 Ben, Wang
Neural Control Based Research of Endogenous Security Model 2021 Li, Tao
IPv6-Darknet Network Traffic Detection 2021 Liu, ChenHuan
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition 2021 Yu, Mujian
Halftone Image Steganography Based on Reassigned Distortion Measurement 2021 Xu, Wenbo
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units 2021 Yin, Xiaolin
Blockchain-Based Reliable Collection Mechanism for Smart Meter Quality Data 2021 Yan, Liu
Alle Artikel auflisten