咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection Algorithm"
174 条 记 录,以下是61-70 订阅
排序:
Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks
收藏 引用
COMPLEX & INTELLIGENT SYSTEMS 2023年 第4期9卷 3717-3738页
作者: Dasgupta, Dipankar Gupta, Kishor Datta Univ Memphis Memphis TN 38152 USA
Defenses against adversarial attacks are essential to ensure the reliability of machine-learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations... 详细信息
来源: 评论
A negative selection algorithm based on hierarchical clustering of self set
收藏 引用
Science China(Information Sciences) 2013年 第8期56卷 203-215页
作者: CHEN Wen LI Tao LIU XiaoJie ZHANG Bing College of Computer Science Sichuan University National Computer Network Emergency Response Technical Team Coordination Center of China
negative selection algorithm(NSA) is an important method of generating artificial immune ***,the traditional NSAs aim at eliminating the self-recognized invalid detectors,by matching candidate detectors with the whole... 详细信息
来源: 评论
Anomaly Detection Using a Novel negative selection algorithm
收藏 引用
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE 2013年 第12期10卷 2831-2835页
作者: Zeng, Jinquan Qin, Zhiguang Tang, Weiwen Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 610054 Peoples R China Sichuan Commun Res Planning & Designing Co Ltd Chengdu 610041 Peoples R China
negative selection algorithm (NSA) is one of the major algorithms developed within artificial immune system (AIS) and can be used for network security, fault detection, especially, anomaly detection. NSA generates the... 详细信息
来源: 评论
NKA: a pathogen dose-based natural killer cell algorithm and its application to classification
收藏 引用
JOURNAL OF SUPERCOMPUTING 2022年 第5期78卷 7016-7037页
作者: Wang, Dongmei Liang, Yiwen Yang, Xinmin Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China
Inspired by the self/non-self discrimination theory, Forrest et al. proposed a distance-based negative selection algorithm (NSA). However, in the detector generation phase, NSA creates specific antibodies for each ant... 详细信息
来源: 评论
A Framework of Intrusion Detection Inspired by Artificial Immune System  1st
A Framework of Intrusion Detection Inspired by Artificial Im...
收藏 引用
1st International Conference on Emerging Networking Architecture and Technologies (ICENAT)
作者: Zhang, Haodi Huang, Zeyuan Wang, Shuai Jin, Huamin Deng, Xiaodong China Telecom Corp Ltd Guangdong Res Inst Guangzhou Guangdong Peoples R China
The Human Immune System categorizes substances into self and non-self to find intrusions. This idea provides a good model for intrusion detection systems in the computer science field. This model has developed into a ... 详细信息
来源: 评论
Using a Novel negative selection Inspired Anomaly Detection algorithm to Identify Corrupted Ribo-seq and RNA-seq Samples  19
Using a Novel Negative Selection Inspired Anomaly Detection ...
收藏 引用
10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (ACM-BCB)
作者: Perkins, Patrick Heber, Steffen North Carolina State Univ Bioinformat Res Ctr Raleigh NC 27695 USA North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
RNA-seq and Ribo-seq are popular techniques for quantifying cellular transcription and translation. These experiments use next-generation sequencing to produce genome-wide high-resolution snapshots of the total popula... 详细信息
来源: 评论
Applying the negative selection algorithm for Merger and Acquisition Target Identification Theory and Case Study
Applying the Negative Selection Algorithm for Merger and Acq...
收藏 引用
1st BRICS Countries Congress on Computational Intelligence / 11th Brazilian Congress on Computational Intelligence (BRICS-CCI and CBIC)
作者: Paul, Satyakama Janacek, Andreas de Lima Neto, Fernando Buarque Marwala, Tshilidzi Univ Johannesburg Dept Mech Engn Sci FEBE APK Campus ZA-2006 Johannesburg South Africa Univ Johannesburg RTI ZA-2006 Johannesburg South Africa Univ Vienna Res Grp Theory & Applicat Algorithms A-1090 Vienna Austria Univ Permambuco POLI Comp Eng Program BR-720001 Recife PE Brazil
In this paper, we propose a new methodology based on the negative selection algorithm that belongs to the field of Computational Intelligence (specifically, Artificial Immune Systems - AIS) to identify takeover target... 详细信息
来源: 评论
Investigating One-Class Classifiers to Diagnose Alzheimer's Disease from Handwriting  21st
Investigating One-Class Classifiers to Diagnose Alzheimer's ...
收藏 引用
21st International Conference on Image Analysis and Processing (ICIAP)
作者: Parziale, Antonio Della Cioppa, Antonio Marcelli, Angelo Univ Salerno DIEM Via Giovanni Paolo II 132 I-84084 Fisciano SA Italy Univ Salerno Unit Natl Lab Artificial Intelligence & Intelligent Sy CINI Fisciano SA Italy ICAR CNR Via P Castellino 111 I-80131 Naples Italy
The analysis of handwriting and drawing has been adopted since the early studies to help diagnose neurodegenerative diseases, such as Alzheimer's and Parkinson's. Departing from the current state-of-the-art me... 详细信息
来源: 评论
Improving damage detection by combining multiple classifiers in different feature spaces
收藏 引用
ENGINEERING STRUCTURES 2024年 299卷
作者: Barontini, Alberto Masciotta, Maria Giovanna Amado-Mendes, Paulo Ramos, Luis F. Lourenco, Paulo B. Univ Minho ISISE ARISE Dept Civil Engn Guimaraes Portugal Univ G Annunzio Chieti Pescara Dept Engn & Geol Viale Pindaro 42 I-65127 Pescara Italy Univ G Annunzio Chieti Pescara Res Ctr UdA TechLab I-66100 Chieti Italy Univ Coimbra ISISE ARISE Dept Civil Engn Coimbra Portugal
Vibration-based damage identification methods have been explored in several engineering fields. However, the effective damage-sensitivity of vibration-based features and the balance between false alarms and readiness ... 详细信息
来源: 评论
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems  9th
Dealing with Complexity for Immune-Inspired Anomaly Detectio...
收藏 引用
9th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM)
作者: Reuter, Lenhard Leitner, Maria Smith, Paul Koschuch, Manuel Univ Appl Sci FH Campus Wien Vienna Austria Univ Vienna Fac Comp Sci Vienna Austria AIT Austrian Inst Technol GmbH Ctr Digital Safety & Secur Seibersdorf Austria
With digitization, critical infrastructures face a higher risk of security incidents and attacks on cyber-physical systems (CPS). In the past 50 years, research and practice have developed various approaches to monito... 详细信息
来源: 评论