Cooperative malicious network behavior recognition algorithm in E-commerce
暂无分享,去创建一个
Hongwei Lu | Man Zhou | Lansheng Han | Cai Fu | Dezhi An | Hongwei Lu | Cai Fu | Lansheng Han | Man Zhou | Dezhi An
[1] Lefei Li,et al. A Smart B2C e-Commerce System Based on ACP Approach , 2014, IEEE Intelligent Systems.
[2] Gillian Dobbie,et al. Analysis of particle swarm optimization based hierarchical data clustering approaches , 2015, Swarm Evol. Comput..
[3] Ben Niu,et al. A Population-Based Clustering Technique Using Particle Swarm Optimization and K-Means , 2015, ICSI.
[4] Clara Pizzuti,et al. A Multiobjective Genetic Algorithm to Find Communities in Complex Networks , 2012, IEEE Transactions on Evolutionary Computation.
[5] Haibo He,et al. Operating Parameters Optimization for the Aluminum Electrolysis Process Using an Improved Quantum-Behaved Particle Swarm Algorithm , 2018, IEEE Transactions on Industrial Informatics.
[6] Xiaojun Wu,et al. Convergence analysis and improvements of quantum-behaved particle swarm optimization , 2012, Inf. Sci..
[7] Ahmed Ali Abdalla Esmin,et al. Consensus Clustering Based on Particle Swarm Optimization Algorithm , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[8] Bo Du,et al. An Improved Quantum-Behaved Particle Swarm Optimization for Endmember Extraction , 2019, IEEE Transactions on Geoscience and Remote Sensing.
[9] MengChu Zhou,et al. Modeling and Validating E-Commerce Business Process Based on Petri Nets , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[10] M E J Newman,et al. Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[11] Wanlei Zhou,et al. Modeling malicious activities in cyber space , 2015, IEEE Network.
[12] Maoguo Gong,et al. Quantum-behaved discrete multi-objective particle swarm optimization for complex network clustering , 2017, Pattern Recognit..
[13] Yidong Li,et al. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..
[14] Bo Du,et al. A Novel Endmember Extraction Method for Hyperspectral Imagery Based on Quantum-Behaved Particle Swarm Optimization , 2017, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[15] MengChu Zhou,et al. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns , 2016, IEEE Transactions on Automation Science and Engineering.
[16] K. Menger. Statistical Metrics. , 1942, Proceedings of the National Academy of Sciences of the United States of America.
[17] Nadjet Kamel,et al. A new quantum chaotic cuckoo search algorithm for data clustering , 2018, Expert Syst. Appl..
[18] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[19] E. Cunha,et al. Finding our way: a review on the evolution of human spatial cognition , 2014 .
[20] Xiaojun Wu,et al. Quantum-Behaved Particle Swarm Optimization: Analysis of Individual Particle Behavior and Parameter Selection , 2012, Evolutionary Computation.
[21] Nenghai Yu,et al. Learning Bregman Distance Functions for Semi-Supervised Clustering , 2012, IEEE Transactions on Knowledge and Data Engineering.
[22] Jun Sun,et al. Improved quantum-behaved particle swarm optimization with local search strategy , 2017 .
[23] Wang Hu,et al. Adaptive Multiobjective Particle Swarm Optimization Based on Parallel Cell Coordinate System , 2015, IEEE Transactions on Evolutionary Computation.
[24] Song Guo,et al. Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.
[25] Naixue Xiong,et al. An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks , 2019, IEEE Access.
[26] Wei Xing Zheng,et al. Distributed $k$ -Means Algorithm and Fuzzy $c$ -Means Algorithm for Sensor Networks Based on Multiagent Consensus Theory , 2017, IEEE Transactions on Cybernetics.
[27] Kangfeng Zheng,et al. Intrusion detection algorithm based on density, cluster centers, and nearest neighbors , 2016, China Communications.
[28] Leandro Nunes de Castro,et al. Particle Swarm Clustering in clustering ensembles: Exploiting pruning and alignment free consensus , 2017, Appl. Soft Comput..
[29] Hojat Ghimatgar,et al. An improved feature selection algorithm based on graph clustering and ant colony optimization , 2018, Knowl. Based Syst..
[30] A. Kannan,et al. Detecting cloning attack in Social Networks using classification and clustering techniques , 2014, 2014 International Conference on Recent Trends in Information Technology.
[31] Muhammad Al-Qurishi,et al. Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks , 2018, IEEE Transactions on Industrial Informatics.
[32] Xiao Wang,et al. VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.
[33] Kun Guo,et al. Data mining for the online retail industry: A case study of RFM model-based customer segmentation using data mining , 2012 .
[34] Yongli Wang,et al. A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing , 2020, J. Netw. Comput. Appl..
[35] Shuping Sun,et al. On the Mahalanobis Distance Classification Criterion for a Ventricular Septal Defect Diagnosis System , 2019, IEEE Sensors Journal.
[36] Zhu Han,et al. Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.
[37] Hsiao-Dong Chiang,et al. Hierarchical K-means Method for Clustering Large-Scale Advanced Metering Infrastructure Data , 2017, IEEE Transactions on Power Delivery.
[38] Maoguo Gong,et al. Greedy discrete particle swarm optimization for large-scale social network clustering , 2015, Inf. Sci..