咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 13 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 3 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 17 篇 deep stacked aut...
  • 3 篇 deep learning
  • 2 篇 tversky index
  • 2 篇 cloud computing
  • 1 篇 internet of thin...
  • 1 篇 n-gram features
  • 1 篇 cyber attacks
  • 1 篇 intrusion detect...
  • 1 篇 cyber-physical s...
  • 1 篇 routing
  • 1 篇 power systems
  • 1 篇 facial emotion r...
  • 1 篇 cyberattack
  • 1 篇 h-vlbp
  • 1 篇 taylor series
  • 1 篇 mobilenet
  • 1 篇 mhog
  • 1 篇 quantile normali...
  • 1 篇 big data
  • 1 篇 solar irradiatio...

机构

  • 1 篇 sr univ sch comp...
  • 1 篇 gitam univ dept ...
  • 1 篇 manonmaniam sund...
  • 1 篇 koneru lakshmaia...
  • 1 篇 sathyabama inst ...
  • 1 篇 agni coll techno...
  • 1 篇 srm univ ap dept...
  • 1 篇 koneru lakshmaia...
  • 1 篇 neil gogte inst ...
  • 1 篇 srm inst sci & t...
  • 1 篇 srm inst sci & t...
  • 1 篇 indian inst tech...
  • 1 篇 washington state...
  • 1 篇 manonmaniam sund...
  • 1 篇 faculty of mecha...
  • 1 篇 malla reddy coll...
  • 1 篇 siemens corp pri...
  • 1 篇 univ malaya fac ...
  • 1 篇 malla reddy coll...
  • 1 篇 department of el...

作者

  • 2 篇 maram balajee
  • 2 篇 suresh s.
  • 1 篇 devi s. anjali
  • 1 篇 abdullah mughees
  • 1 篇 krishnan v. v. g...
  • 1 篇 nagendra prabhu ...
  • 1 篇 venugopal sabare...
  • 1 篇 rao t. subha mas...
  • 1 篇 pi j.
  • 1 篇 ram m. sitha
  • 1 篇 ponnusamy r.
  • 1 篇 singh juginder p...
  • 1 篇 nathan uma devi ...
  • 1 篇 dileep pulugu
  • 1 篇 teh ying wah
  • 1 篇 elizabeth shiloa...
  • 1 篇 ali jahid
  • 1 篇 sathianesan godf...
  • 1 篇 gopisetty guru k...
  • 1 篇 kumar manoj

语言

  • 17 篇 英文
检索条件"主题词=Deep stacked Autoencoder"
17 条 记 录,以下是1-10 订阅
排序:
Feature selection and hybrid CNNF deep stacked autoencoder for botnet attack detection in IoT
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2025年 122卷
作者: Kalidindi, Archana Arrama, Mahesh Babu VNR Vignana Jyothi Inst Engn & Technol Dept CSE AIML & IoT Hyderabad India Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Hyderabad Telangana India
Botnet attack is a severe cyber security issue, which occurs in the Internet of Things (IoT). These attacks are carried out by hackers to acquire control of various IoT devices and carry out illegal activities. Though... 详细信息
来源: 评论
Positional-attention based bidirectional deep stacked autoencoder for aspect based sentimental analysis
收藏 引用
BIG DATA RESEARCH 2025年 39卷
作者: Devi, S. Anjali Ram, M. Sitha Dileep, Pulugu Pappu, Sasibhushana Rao Rao, T. Subha Mastan Malyadri, Mula Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Guntur 522302 Andhra Pradesh India SRM Univ AP Dept CSE Amaravati 522240 Andhra Pradesh India Malla Reddy Coll Engn & Technol Dept Comp Sci & Engn Hyderabad Telangana India GITAM Univ Dept Comp Sci & Engn Visakhapatnam Andhra Pradesh India GITAM Deemed Be Univ Dept Comp Sci & Engn Hyderabad 502329 India
With the rapid growth of Internet technology and social networks, the generation of text-based information on the web is increased. To ease the Natural Language Processing (NLP) tasks, analyzing the sentiments behind ... 详细信息
来源: 评论
Hybrid optimization based deep stacked autoencoder for routing and intrusion detection
收藏 引用
WEB INTELLIGENCE 2025年 第1期23卷 3-22页
作者: Boopathi, Mythili Vellore Inst Technol Sch Comp Sci Engn & Informat Syst Vellore 632014 Tamil Nadu India
This research introduced the optimized deep stacked autoencoder (DSA) for performing Intrusion Detection (ID) in the IoT. Firstly, IoT simulation is carried out and then, the information is routed by using the Chronol... 详细信息
来源: 评论
FDN-SA: Fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering
收藏 引用
COMPUTERS & SECURITY 2025年 148卷
作者: Vidyasri, P. Suresh, S. SRM Inst Sci & Technol Dept Comp Sci & Engn Chennai 600089 Tamil Nadu India
Phishing attacks have emerged as a major social engineering threat that affects businesses, governments, and general internet users. This work proposes a social engineering phishing detection technique based on deep L... 详细信息
来源: 评论
Smartphone Motion Sensor-Based Complex Human Activity Identification Using deep stacked autoencoder Algorithm for Enhanced Smart Healthcare System
收藏 引用
SENSORS 2020年 第21期20卷 6300页
作者: Alo, Uzoma Rita Nweke, Henry Friday Teh, Ying Wah Murtaza, Ghulam Alex Ekwueme Fed Univ Comp Sci Dept PMB 1010 Abakaliki 480263 Ebonyi State Nigeria Ebonyi State Univ Comp Sci Dept Pmb 053 Abakaliki 480211 Ebonyi State Nigeria Univ Malaya Fac Comp Sci & Informat Technol Dept Informat Syst Kuala Lumpur 50603 Malaysia Sukkur IBA Univ Dept Comp Sci Sukkur 65200 Pakistan
Human motion analysis using a smartphone-embedded accelerometer sensor provided important context for the identification of static, dynamic, and complex sequence of activities. Research in smartphone-based motion anal... 详细信息
来源: 评论
Optimized deep stacked autoencoder for ransomware detection using blockchain network
收藏 引用
INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING 2021年 第6期19卷 2150022-2150022页
作者: Nalinipriya, G. Maram, Balajee Vidyadhari, Ch. Cristin, R. Saveetha Engn Coll Dept Informat Technol Saveetha Nagar Chennai 602105 Tamil Nadu India GMR Inst Technol Dept Comp Sci & Engn GMR Nagar Rajam 532127 Andhra Pradesh India Gokaraju Rangaraju Inst Engn & Technol Dept Informat Technol Hyderabad 500090 Telangana India
The innovation of technologies has become ubiquitous and imperative in day-to-day lives. Malware is the major threat to the network, and Ransomware is a special and harmful type of malware. Ransomware led to huge data... 详细信息
来源: 评论
Cyber forensic framework for big data analytics using Sunflower Jaya optimization-based deep stacked autoencoder
收藏 引用
INTERNATIONAL JOURNAL OF NUMERICAL MODELLING-ELECTRONIC NETWORKS DEVICES AND FIELDS 2021年 第5期34卷 e2892-e2892页
作者: Venugopal, Sabaresan Sathianesan, Godfrey Winster Rengaswamy, Ramesh Agni Coll Technol Chennai Tamil Nadu India SRM Inst Sci & Technol Chennai Tamil Nadu India Saveetha Engn Coll Thandalam Chennai Tamil Nadu India
The skills of forensic analysts are at risk to process the increasing data in the Internet of Things-based environment platforms. However, the technical issues like anti-forensics, variety of traffic formats, steganog... 详细信息
来源: 评论
Hexagonal Volume Local Binary Pattern (H-VLBP) with deep stacked autoencoder for Human Action Recognition
收藏 引用
COGNITIVE SYSTEMS RESEARCH 2019年 58卷 71-93页
作者: Kiruba, K. Elizabeth, Shiloah D. Raj, Sunil Retmin C. Anna Univ Dept Comp Sci & Engn CEG Campus Chennai 600025 Tamil Nadu India Anna Univ Dept Informat Technol MIT Campus Chennai 600044 Tamil Nadu India
Human action recognition plays a significant role in a number of computer vision applications. This work is based on three processing stages. In the first stage, discriminative frames are selected as representative fr... 详细信息
来源: 评论
Bi-LSTM-Based deep stacked Sequence-to-Sequence autoencoder for Forecasting Solar Irradiation and Wind Speed
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 6375-6393页
作者: Neelam Mughees Mujtaba Hussain Jaffery Abdullah Mughees Anam Mughees Krzysztof Ejsmont Department of Electrical and Computer Engineering COMSATS University IslamabadLahore Campus45550Pakistan School of Engineering and Technology National Textile UniversityFaisalabad37610Pakistan Department of Electrical Engineering Information Technology UniversityLahore54000Pakistan Department of Electrical Engineering GC UniversityFaisalabad38000Pakistan Faculty of Mechanical and Industrial Engineering Warsaw University of Technology02-524WarsawPoland
Wind and solar energy are two popular forms of renewable energy used in microgrids and facilitating the transition towards net-zero carbon emissions by ***,they are exceedingly unpredictable since they rely highly on ... 详细信息
来源: 评论
Exponential Squirrel Search Algorithm-Based deep Classifier for Intrusion Detection in Cloud Computing with Big Data Assisted Spark Framework
收藏 引用
CYBERNETICS AND SYSTEMS 2024年 第2期55卷 331-350页
作者: Polepally, Vijayakumar Jagannadha Rao, D. B. Kalpana, Parsi Nagendra Prabhu, S. Kakatiya Inst Technol & Sci Dept Comp Sci & Engn Warangal Telangana India Shri Jagdishprasad Jhabarmal Tibrewala Univ Dept Comp Sci & Engn Jhunjhunu Rajasthan India St Francis Coll Women Dept Comp Sci Hyderabad Telangana India Malla Reddy Coll Engn & Technol Dept Comp Sci & Engn Dhulapally Telangana India Kakatiya Inst Technol & Sci Dept Comp Sci & Engn Warangal 506015 Telangana India Malla Reddy Univ Hyderabad Dept Comp Sci & Engn Data Sci Hyderabad 500043 Telangana India Vasavi Coll Engn Dept Comp Sci & Engn Hyderabad 500031 Telangana India SRM Inst Sci & Technol Sch Comp Dept Computat Intelligence Chennai 603203 Tamilanadu India
Intrusion detection systems (IDS) are extensively employed for detecting suspicious behaviors in hosts. The ability of distributed IDS solutions makes it viable to combine and handle various kinds of sensors and gener... 详细信息
来源: 评论