Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Yiqiang Sheng"'
Publikováno v:
IEEE Access, Vol 8, Pp 41254-41261 (2020)
There is a cold-start problem in the recommendation system field, which is how to profile new users and new items. The popular recommendation algorithm is an important solution to the cold-start problem. In this paper, we propose a new joint deep net
Externí odkaz:
https://doaj.org/article/04366676495649948358d86c0b1d68c3
Publikováno v:
IEEE Access, Vol 8, Pp 175467-175482 (2020)
The development of computer and network technology has provided convenience to our daily life, however, attack and intrusion in network emerge endlessly. Intrusion Detection System (IDS) has been developed to confront network attacks. As a result, th
Externí odkaz:
https://doaj.org/article/3b14c5b798974f348fc978c575b43996
Publikováno v:
IEEE Access, Vol 7, Pp 49985-49998 (2019)
This paper investigates variant-gated recurrent units with encoders to preprocess packets for payload-aware intrusion detection. The variant-gated recurrent units include an encoded gated recurrent unit (E-GRU) and an encoded binarized gated recurren
Externí odkaz:
https://doaj.org/article/43dabce7608446688d91e66e27fbfc0f
Publikováno v:
IEEE Access, Vol 7, Pp 82913-82926 (2019)
In the studies of cybersecurity, malicious traffic detection is attracting more and more attention for its capability of detecting attacks. Almost all of the intrusion detection methods based on deep learning have poor data processing capacity with t
Externí odkaz:
https://doaj.org/article/c00b872c5a334ddf9c0d2c8ad5e8e53d
Publikováno v:
IEEE Access, Vol 7, Pp 120262-120272 (2019)
User's behaviors and preferences alter with the temporal evolution dynamically, which leads to low performance, such as the Hit Rate and Normalized Discounted Cumulative Gain (NDCG). Understanding the dynamics of users' behaviors and preferences can
Externí odkaz:
https://doaj.org/article/7263c61628c142b1aeae1a07cc5d3d0e
Publikováno v:
IEEE Access, Vol 6, Pp 67070-67081 (2018)
With the rapid increase of users and resources on the Internet, the scale of the recommender system becomes larger and larger. There are three major challenges facing in recommender system: sparsity, scalability, and cold start. In this paper, we mai
Externí odkaz:
https://doaj.org/article/5b17601678d5437bb52a1a7f58e7915e
Publikováno v:
IEEE Access, Vol 6, Pp 1792-1806 (2018)
The development of an anomaly-based intrusion detection system (IDS) is a primary research direction in the field of intrusion detection. An IDS learns normal and anomalous behavior by analyzing network traffic and can detect unknown and new attacks.
Externí odkaz:
https://doaj.org/article/51eea1ce553f4b5b9c60b170281838b5
Autor:
Yiqiang Sheng
Publikováno v:
IEEE Access, Vol 6, Pp 30378-30391 (2018)
In order to improve future network performance, this paper proposes scalable intelligence-enabled networking (SIEN) with eliminating traffic redundancy for audio-visual-tactile Internet in 5G scenarios, such as enhanced mobile broadband, ultra-reliab
Externí odkaz:
https://doaj.org/article/68e47fc7ec434b41b5298a40c3e1384d
Publikováno v:
Applied Sciences, Vol 10, Iss 10, p 3588 (2020)
Information-centric networking (ICN) is an emerging network architecture that has the potential to address demands related to transmission latency and reliability in fifth-generation (5G) communication technology and the Internet of Things (IoT). As
Externí odkaz:
https://doaj.org/article/4367552f5509492e8b1179eb74d12180
Publikováno v:
Applied Sciences, Vol 9, Iss 20, p 4473 (2019)
Most existing studies on an unsupervised intrusion detection system (IDS) preprocessing ignore the relationship among packets. According to the homophily hypothesis, the local proximity structure in the similarity relational graph has similar embeddi
Externí odkaz:
https://doaj.org/article/4b1fc6d2f73d4309b9ad255bda174ff1