Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Xinzheng He"'
Publikováno v:
IEEE Access, Vol 5, Pp 21954-21961 (2017)
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network. In this paper, we explore how to model an intrusion detection system based on deep learning
Externí odkaz:
https://doaj.org/article/68d19e98ae434c93a173671c5daac7a9
Publikováno v:
Molecular Medicine Reports. Jun2017, Vol. 15 Issue 6, p3529-3534. 6p. 4 Graphs.
Publikováno v:
Molecular Medicine Reports
Damage of retinal ganglion cells (RGCs) is the major consequence of glaucoma and regeneration of RGCs is extremely difficult once the damage has occurred. Retinal stem cells (RSCs) are considered an ideal choice for RGC regeneration. Pigmented cells
Publikováno v:
IEEE Access, Vol 5, Pp 21954-21961 (2017)
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network. In this paper, we explore how to model an intrusion detection system based on deep learning
Autor:
Xinzheng He
Publikováno v:
2019 5TH INTERNATIONAL CONFERENCE ON GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS (GPMMTA 2019).
Publikováno v:
DEStech Transactions on Engineering and Technology Research.
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic, the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine learning by combining the advanta
Publikováno v:
DEStech Transactions on Engineering and Technology Research.
The establishment of the network traffic model has an important significance on the research of network. On the basis of existing researches, this paper proposes the improved Semi-Markov network traffic model, and re-divides the state of network traf
Publikováno v:
ICDS
Provable security based on complexity theory provides an efficient way for providing the convincing evidences of security. In this paper, we present a definition of generic ID-based signature schemes by extending the definition of generic signature s