Negative selection algorithms: from the thymus to v-detector
暂无分享,去创建一个
[1] Antonio Fernández,et al. One-class texture classifier in the CCR feature space , 2003, Pattern Recognit. Lett..
[2] Eamonn J. Keogh,et al. Finding surprising patterns in a time series database in linear time and space , 2002, KDD.
[3] Fabio A. González,et al. A comparative analysis of artificial immune network models , 2005, GECCO '05.
[4] Peter Ross,et al. Exploiting the analogy between immunology and sparse distributedmemories : a system for lustering non-stationary data , 2002 .
[5] Jon Timmis,et al. Artificial Immune Recognition System (AIRS): Revisions and Refinements , 2002 .
[6] R S Nanda,et al. Analysis of factors affecting angle ANB. , 1984, American journal of orthodontics.
[7] Fabio A. González,et al. An Novel Artificial Immune System Approach to Robust Data Mining , 2002, GECCO Late Breaking Papers.
[8] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[9] Mark James Neal,et al. Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.
[10] Zhou Ji,et al. Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.
[11] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[12] John E. Hunt,et al. An adaptive, distributed learning system based on the immune system , 1995, 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century.
[13] Kevin P. Anchor,et al. CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.
[14] L.N. de Castro,et al. An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[15] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[16] Zhou Ji,et al. Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[17] Lois Boggess,et al. Non-Euclidean distance measures in AIRS, an artificial immune classification system , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[18] Dipankar Dasgupta,et al. An immunochip architecture and its emulation , 2002, Proceedings 2002 NASA/DoD Conference on Evolvable Hardware.
[19] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[20] Jonathan Timmis,et al. AINE: an immunological approach to data mining , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[21] Zhou Ji,et al. Estimating the detector coverage in a negative selection algorithm , 2005, GECCO '05.
[22] N K Jerne,et al. Towards a network theory of the immune system. , 1973, Annales d'immunologie.
[23] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[24] Dipankar Dasgupta. An Overview of Artificial Immune Systems and Their Applications , 1993 .
[25] Carlos A. Coello Coello,et al. A parallel implementation of an artificial immune system to handle constraints in genetic algorithms: preliminary results , 2002, IEEE Congress on Evolutionary Computation.
[26] Peter J. Bentley,et al. Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .
[27] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[28] David W. Corne,et al. An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.
[29] Richard Wheeler,et al. The Effect of Antibody Morphology on Non-self Detection , 2003, ICARIS.
[30] Jon Timmis,et al. A Multi-Layered Immune Inspired Approach to Data Mining , 2003 .
[31] J. Neidhoefer,et al. Immunized Adaptive Critic for an Autonomous Aircraft Control Application , 1999 .
[32] Leandro Nunes de Castro,et al. An Immunological Approach to Initialize Feedforward Neural Network Weights , 2001 .
[33] Shi Wengang,et al. Negative-selection algorithm based approach for fault diagnosis of rotary machinery , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).
[34] B. Everitt,et al. Statistical methods for rates and proportions , 1973 .
[35] P. Hajela,et al. Immune network simulations in multicriterion design , 1999 .
[36] Peter Ross,et al. Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.
[37] Simon M. Garrett,et al. How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.
[38] Jongsoo Lee,et al. Constrained genetic search via schema adaptation: An immune network solution , 1996 .
[39] Jonathan Timmis. Artificial immune systems : a novel data analysis technique inspired by the immune network theory , 2000 .
[40] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.
[41] Marc Ebner,et al. On The Use Of Negative Selection In An Artificial Immune System , 2002, GECCO.
[42] Paul Helman,et al. On-line Negative Databases , 2004, Int. J. Unconv. Comput..
[43] Claudia Eckert,et al. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.
[44] Dipankar Dasgupta. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[45] Dipankar Dasgupta,et al. The Promise and Challenges of Artificial Immune System Based Web Usage Mining : Preliminary Results , 2002 .
[46] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[47] John E. Hunt,et al. Learning using an artificial immune system , 1996 .
[48] Jonathan Timmis,et al. Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.
[49] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[50] Patrik D'haeseleer,et al. An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[51] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[52] Young-Il Kim,et al. Complementary Dual Detectors for Effective Classification , 2003, ICARIS.
[53] Andrew M. Tyrrell,et al. Immunotronics: Hardware Fault Tolerance Inspired by the Immune System , 2000, ICES.
[54] Zhou Ji,et al. A BOUNDARY-AWARE NEGATIVE SELECTION ALGORITHM , 2005 .
[55] Felipe Cucker,et al. On the mathematical foundations of learning , 2001 .
[56] Dipankar Dasgupta,et al. A study of artificial immune systems applied to anomaly detection , 2003 .
[57] Fabio A. González,et al. A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning , 2003, GECCO.
[58] Emma Hart,et al. Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.
[59] Susan Stepney,et al. Towards a Conceptual Framework for Artificial Immune Systems , 2004, ICARIS.
[60] A. B. Watkins,et al. A resource limited artificial immune classifier , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[61] Robert Kozma,et al. Dynamical neuro-representation of an immune model and its application for data classification , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[62] Jonathan Timmis,et al. Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..
[63] J Timmis,et al. An artificial immune system for data analysis. , 2000, Bio Systems.
[64] Paul Helman,et al. The Crossover Closure and Partial Match Detection , 2003, ICARIS.
[65] David M. J. Tax,et al. One-class classification , 2001 .
[66] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[67] Fabio A. González,et al. The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.
[68] Mohd Aizaini Maarof,et al. Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons , 2004, ICARIS.
[69] Fabio A. González,et al. Discriminating and visualizing anomalies using negative selection and self-organizing maps , 2005, GECCO '05.
[70] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[71] Dipankar Dasgupta,et al. A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[72] Mark Neal,et al. An artificial immune system for continuous analysis of time-varying data , 2002 .
[73] D. Wong,et al. Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.
[74] Claudia Eckert,et al. An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.
[75] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[76] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[77] Dipankar Dasgupta,et al. An Immunogenetic Approach to Spectra Recognition , 1999, GECCO.
[78] F. Varela,et al. Evidence for a functional idiotypic network among natural antibodies in normal mice. , 1989, Proceedings of the National Academy of Sciences of the United States of America.
[79] Leandro Nunes de Castro,et al. Artificial Immune Systems: Part I-Basic Theory and Applications , 1999 .
[80] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[81] Agostinho C. Rosa,et al. Immune System Simulation through a Complex Adaptive System Model , 2002 .
[82] Stephanie Forrest,et al. Information Immune Systems , 2003, Genetic Programming and Evolvable Machines.
[83] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[84] Dipankar Dasgupta,et al. An immunogenetic approach in chemical spectrum recognition , 2003 .
[85] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[86] D. Dasgupta,et al. A formal model of an artificial immune system. , 2000, Bio Systems.
[87] Weber Je,et al. Statistical analysis: Applications to business and economics , 1980 .
[88] Honghua Dai,et al. Constructing Detectors in Schema Complementary Space for Anomaly Detection , 2004, GECCO.
[89] Fabio A. González,et al. An Imunogenetic Technique To Detect Anomalies In Network Traffic , 2002, GECCO.
[90] Sankar K. Pal,et al. Fuzzy sets and decisionmaking approaches in vowel and speaker recognition , 1977 .
[91] Senhua Yu,et al. MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.
[92] Gilbert L. Peterson,et al. An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection , 2005, GECCO '05.
[93] J. R. Quinlan,et al. Data Mining Tools See5 and C5.0 , 2004 .
[94] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[95] Slawomir T. Wierzchon,et al. Deriving a concise description of non-self patterns in an artificial immune system , 2002 .
[96] H. Dai,et al. Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.
[97] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[98] Eamonn J. Keogh,et al. HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[99] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[100] S T Lhu,et al. Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .
[101] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[102] H. Abbass,et al. aiNet : An Artificial Immune Network for Data Analysis , 2022 .
[103] Surya P. N. Singh,et al. Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.
[104] Jonathan Timmis,et al. A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..
[105] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).