Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the *** techniques have been suggested for detecting attacks using machine learning...
详细信息
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the *** techniques have been suggested for detecting attacks using machine learning and deep *** significant advantage of deep learning is that it is highly efficient,but it needs a large training time with a lot of ***,in this paper,we present a new feature reduction strategy based on Distributed Cumulative Histograms(DCH)to distinguish between dataset features to locate the most effective *** histograms assess the dataset instance patterns of the applied features to identify the most effective attributes that can significantly impact the classification *** different models for detecting attacks using Convolutional Neural Network(CNN)and Long Short-Term Memory Network(LSTM)are also *** accuracy test of attack detection using the hybrid model was 98.96%on the UNSW-NP15 *** proposed model is compared with wrapper-based and filter-based Feature Selection(FS)*** proposed model reduced classification time and increased detection accuracy.
Since group activities have become very common in daily life, there is an urgent demand for generating recommendations for a group of users, referred to as group recommendation task. Existing group recommendation meth...
详细信息
Image inpainting, aiming at exactly recovering missing pixels from partially observed entries, is typically an ill-posed problem. As a powerful constraint, low-rank priors have been widely applied in image inpainting ...
详细信息
In Non-Geostationary Orbit Satellite Networks (NGOSNs) with a large number of battery-carrying satellites, proper power allocation and task scheduling are crucial to improving data offloading efficiency. In this work,...
详细信息
With the continuous improvement of industrial automation level, machine vision technology has been widely applied in the field of workpiece defect detection and sorting. In response to this demand, this paper proposes...
详细信息
The Internet of Things (loT) facilitates the interconnection of a vast array of devices, services, and individuals for data exchange in multi-domain loT ecosystems, the social, physical, and cyber domains. That emerge...
详细信息
Federated learning (FL) has emerged as a powerful framework for training deep learning models across numerous distributed clients, where a central server distributes and aggregates model updates without accessing clie...
详细信息
The uncapacitated facility location problem (UFLP) is a well-known combinational optimization problem, attracting numerous heuristic and meta-heuristic methods. However, these effective algorithms still encounter chal...
详细信息
The partitioning of RDF data on a large scale allows generating a set of RDF data subgraphs. METIS is a graph partitioning technique that minimises the cost of partitioning. METIS applies, among other things, to RDF g...
详细信息
作者:
Chen, KeHan, XiaosongLi, XiaoranLiang, YanchunXu, DongGuan, RenchuJilin University
Key Laboratory for Symbol Computation and Knowledge Engineering of National Education Ministry College of Software Changchun China Jilin University
Key Laboratory for Symbol Computation and Knowledge Engineering of National Education Ministry College of Computer Science and Technology Changchun China Zhuhai College of Science and Technology
Zhuhai Laboratory of Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education School of Computer Science Zhuhai China University of Missouri
Christopher S. Bond Life Sciences Center Department of Electrical Engineering and Computer Science Columbia United States
Drug-Drug Interaction (DDI) task plays a crucial role in clinical treatment and drug development. Recently, deep learning methods have been successfully applied for DDI prediction. However, training deep learning mode...
详细信息
暂无评论