咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection Algorithm"
174 条 记 录,以下是11-20 订阅
排序:
An improved real-valued negative selection algorithm based on the constant detector for anomaly detection
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2021年 第5期40卷 8793-8806页
作者: Li, Dong Sun, Xin Gao, Furong Liu, Shulin Changzhou Univ Sch Petr Engn Changzhou Peoples R China Shanghai Univ Sch Mechatron Engn & Automat Shanghai Peoples R China Hong Kong Univ Sci & Technol Dept Chem & Biol Engn Hong Kong Peoples R China
Compared with the traditional negative selection algorithms produce detectors randomly in whole state space, the boundary-fixed negative selection algorithm (FB-NSA) non-randomly produces a layer of detectors closely ... 详细信息
来源: 评论
negative selection algorithm based methodology for online structural health monitoring
收藏 引用
ENGINEERING STRUCTURES 2021年 229卷 111662-111662页
作者: Barontini, Alberto Masciotta, Maria Giovanna Amado-Mendes, Paulo Ramos, Luis F. Lourenco, Paulo B. Univ Minho Guimaraes Dept Civil Engn ISISE Portugal Campus Azurem P-4800058 Guimaraes Portugal Univ G dAnnunzio Dept Engn & Geol Viale Pindaro 42 Pescara Italy Univ Coimbra ISISE Dept Civil Engn Coimbra Portugal R Luis Reis SantosPolo II P-3030788 Coimbra Portugal
Even small damages in engineered systems can endanger the users or lead to significant economic costs. The detection of damage existence is only the first task within the Damage Identification strategy, nonetheless, i... 详细信息
来源: 评论
negative selection algorithm Based Intrusion Detection Model  20
Negative Selection Algorithm Based Intrusion Detection Model
收藏 引用
20th IEEE Mediterranean Eletrotechnical Conference (IEEE MELECON)
作者: Tosin, Salau-Ibrahim Taofeekat Gbenga, Jimoh Rasheed Al Hikmah Univ Dept Comp Sci Ilorin Nigeria Univ Ilorin Fac Commun & Informat Sci Ilorin Nigeria
The ever-growing security challenges have been a hindrance to the success of Information Technology Innovations due to multifaceted network intrusions. Hence, it becomes imperative to provide tools that can address wi... 详细信息
来源: 评论
Fault diagnosis in wireless sensor network using negative selection algorithm and support vector machine
收藏 引用
COMPUTATIONAL INTELLIGENCE 2020年 第3期36卷 1374-1393页
作者: Mohapatra, Santoshinee Khilar, Pabitra Mohan Natl Inst Technol Rourkela Dept Comp Sci & Engn Rourkela 769008 Odisha India
In this article, an improved negative selection algorithm (INSA) has been proposed to identify faulty sensor nodes in wireless sensor network (WSN) and then the faults are classified into soft permanent, soft intermit... 详细信息
来源: 评论
HD-NSA: A real-valued negative selection algorithm based on hierarchy division
收藏 引用
APPLIED SOFT COMPUTING 2021年 112卷 107726-107726页
作者: He, Junjiang Chen, Wen Li, Tao Li, Beibei Zhu, Yongbin Huang, Meng Sichuan Univ Coll Cybersecur 24 South Sect 1Yihuan Rd Chengdu Peoples R China
The negative selection algorithm (NSA) is an important algorithm for generating immune detectors in artificial immune systems. However, the original NSA randomly generates candidate detectors that produce a large numb... 详细信息
来源: 评论
A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2021年 232卷 1页
作者: Li, Zhiyong Li, Tao He, Junjiang Zhu, Yongbin Wang, Yunpeng Sichuan Univ Sch Cyber Sci & Engn Chengdu 610065 Peoples R China Honghe Univ Informat Technol Ctr Mengzi 661199 Yunnan Peoples R China
A negative selection algorithm generates detectors to realize abnormality detection by simulating the maturation process of T cells in human immunity. Holes are areas of feature space that cannot be covered by the det... 详细信息
来源: 评论
A negative selection algorithm based on adaptive immunoregulation  5
A negative selection algorithm based on adaptive immunoregul...
收藏 引用
5th International Conference on Computational Intelligence and Applications (ICCIA)
作者: Deng, Hongli Yang, Tao China West Normal Univ Educ & Informat Technol Ctr Nanchong Peoples R China
negative selection algorithm (NSA) is an important detectors training algorithm in artificial immune system (AIS). In NSAs, the self radius and location of detectors affect the performance of algorithms. However, the ... 详细信息
来源: 评论
Research on Intrusion Detection System based on Improved negative selection algorithm
International Core Journal of Engineering
收藏 引用
International Core Journal of Engineering 2021年 第10期7卷 494-501页
作者: Zhihao She Mengqian Li
Through the learning and research of the immune negative selection algorithm, after learning the traditional partial matching rules, namely Hamming matching and r-continuous bit matching, summarize its advantages and ... 详细信息
来源: 评论
Clustered negative selection algorithm and fruit fly optimization for email spam detection
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2019年 第1期10卷 143-152页
作者: Chikh, Ramdane Chikhi, Salim Setif 1 Univ Fac Technol Setif Algeria Constantine 2 Univ MISC Lab Constantine Algeria
At present, spam is an actual and increasing problem that compromises email communications across the world. Thus, several solutions have been proposed to stop or reduce the amount of this threat. However, methods bas... 详细信息
来源: 评论
An Antigen Space Triangulation Coverage Based Real-Value negative selection algorithm
收藏 引用
IEEE ACCESS 2019年 7卷 51886-51898页
作者: Fan, Zhang Wen, Chen Tao, Li Cao Xiaochun Peng Haipeng Sichuan Univ Coll Comp Sci Chengdu 610065 Sichuan Peoples R China Sichuan Univ Coll Cybersecur Chengdu 610065 Sichuan Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China
negative selection algorithm (NSA) is an important detector generation algorithm of artificial immune system (AIS). Traditional NSAs randomly generate detectors in the whole antigen space without considering the distr... 详细信息
来源: 评论