Three Branches of Negative Representation of Information: A Survey
暂无分享,去创建一个
Hao Jiang | Ran Liu | Wenjian Luo | Dongdong Zhao | Linli Wu
[1] Ran Liu,et al. A fine-grained algorithm for generating hard-toreverse negative databases , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[2] Shanyu Tang,et al. An Efficient Approximation Method for Calculating Confidence Level of Negative Survey , 2015 .
[3] Zhou Ji,et al. V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..
[4] Wenjian Luo,et al. Fast searching optimal negative surveys , 2014 .
[5] Stephanie Forrest,et al. A Relational Algebra for Negative Databases , 2007 .
[6] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[7] David W. Corne,et al. An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.
[8] Walmir M. Caminhas,et al. Design of an Artificial Immune System for fault detection: A Negative Selection Approach , 2010, Expert Syst. Appl..
[9] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[10] Huey-Ming Lee,et al. A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection , 2007, KES.
[11] Ryan J. Halter,et al. A wearable system that knows who wears it , 2014, MobiSys.
[12] Ying Tan,et al. A Hierarchical Artificial Immune Model for Virus Detection , 2009, 2009 International Conference on Computational Intelligence and Security.
[13] J Timmis,et al. An artificial immune system for data analysis. , 2000, Bio Systems.
[14] Paul Helman,et al. The Crossover Closure and Partial Match Detection , 2003, ICARIS.
[15] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[16] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[17] Riccardo Zecchina,et al. Hiding solutions in random satisfiability problems: A statistical mechanics approach , 2001, Physical review letters.
[18] Zhengjun Liu,et al. An Improved Negative Selection Algorithm Based on Subspace Density Seeking , 2017, IEEE Access.
[19] Zhou Ji,et al. Applicability issues of the real-valued negative selection algorithms , 2006, GECCO.
[20] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[21] Guangchen Ruan,et al. Uninterrupted Approaches for Spam Detection Based on SVM and AIS , 2014 .
[22] Wei Zhang,et al. A Survey of artificial immune applications , 2010, Artificial Intelligence Review.
[23] Ulrik Franke,et al. Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..
[24] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[25] Maciej Liskiewicz,et al. Negative selection algorithms without generating detectors , 2010, GECCO '10.
[26] Víctor M. Guerrero,et al. A Statistical Approach to Provide Individualized Privacy for Surveys , 2016, PloS one.
[27] James Cannady,et al. A Self-Adaptive Evolutionary Negative Selection Approach for Anomaly Detection , 2005 .
[28] Cristopher Moore,et al. Generating Hard Satisfiable Formulas by Hiding Solutions Deceptively , 2005, AAAI.
[29] Senhua Yu,et al. Conserved Self Pattern Recognition Algorithm , 2008, ICARIS.
[30] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[31] Fernando Esponda,et al. Everything That is Not Important: Negative Databases , 2008 .
[32] Amiya Nayak,et al. Network Fault Diagnosis: An Artificial Immune System Approach , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.
[33] Rozaida Ghazali,et al. Negative Selection Algorithm: A Survey on the Epistemology of Generating Detectors , 2013, DaEng.
[34] Salah Al-Sharhan,et al. ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .
[35] Wenjian Luo,et al. Estimating positive surveys from negative surveys , 2013 .
[36] Stephanie Forrest,et al. Reconstructing Spatial Distributions from Anonymized Locations , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.
[37] Hao Jiang,et al. Rating Credits of Online Merchants Using Negative Ranks , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.
[38] Wenjian Luo,et al. SvdNPD: a negative data publication method based on the sensitive value distribution , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[39] Wenjian Luo,et al. On the self representation based on the adaptive self radius , 2011, The Fourth International Workshop on Advanced Computational Intelligence.
[40] Paul Helman,et al. On-line Negative Databases , 2005, Int. J. Unconv. Comput..
[41] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[42] Alireza Osareh,et al. Distribution estimation based negative selection algorithm (DENSA) , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[43] Hao Jiang,et al. On Location and Trace Privacy of the Moving Object Using the Negative Survey , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.
[44] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[45] Dipankar Dasgupta,et al. Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..
[46] Jonathan Timmis,et al. Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.
[47] Ran Liu,et al. Negative Iris Recognition , 2018, IEEE Transactions on Dependable and Secure Computing.
[48] Hao Jiang,et al. On the Reconstruction Method For Negative Surveys with Application to Education Surveys , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.
[49] Paul Helman,et al. Enhancing Privacy through Negative Representations of Data , 2004 .
[50] Lihua Yue,et al. Reconstructing Positive Surveys from Negative Surveys with Background Knowledge , 2016, DMBD.
[51] Hirotada Ohashi,et al. A negative selection algorithm for classification and reduction of the noise effect , 2009, Appl. Soft Comput..
[52] Ran Liu,et al. Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[53] Dipankar Dasgupta,et al. Novelty detection in time series data using ideas from immunology , 1996 .
[54] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[55] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[56] Takeshi Okamoto,et al. Toward an artificial immune server against cyber attacks , 2016, Artificial Life and Robotics.
[57] Pascal Bouvry,et al. Immune anomaly detection enhanced with evolutionary paradigms , 2006, GECCO.
[58] Yoshiteru Ishida. Fully distributed diagnosis by PDP learning algorithm: towards immune network PDP model , 1990, 1990 IJCNN International Joint Conference on Neural Networks.
[59] Ran Liu,et al. Classifying and clustering in negative databases , 2013, Frontiers of Computer Science.
[60] Benjamin Edwards,et al. Enhancing privacy in participatory sensing applications with multidimensional data , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[61] Jean-Yves Fourniols,et al. Smart wearable systems: Current status and future challenges , 2012, Artif. Intell. Medicine.
[62] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[63] D. Wong,et al. Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.
[64] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[65] Liu Xuepeng. Immune PI control on PMSM speed regulating system , 2008, 2008 7th World Congress on Intelligent Control and Automation.
[66] Dipankar Dasgupta,et al. An Investigation of Negative Authentication Systems 1 , 2008 .
[67] Fernando Esponda. Negative Surveys , 2006 .
[68] Surya P. N. Singh,et al. Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.
[69] Paul Helman,et al. Negative representations of information , 2009, International Journal of Information Security.
[70] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[71] Dipankar Dasgupta,et al. A biologically inspired password authentication system , 2009, CSIIRW '09.
[72] Wenjian Luo,et al. A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems , 2009, 2009 International Conference on Computational Intelligence and Security.
[73] Alan S. Perelson,et al. Probability of Self-Nonself Discrimination , 1992 .
[74] Xin Wang,et al. A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for Each Detector , 2006, PPSN.
[75] Wenjian Luo,et al. On the dependable level of the negative survey , 2014 .
[76] Amelia Ritahani Ismail,et al. An artifical immune systems for robot organisms , 2010 .
[77] Cristopher Moore,et al. Hiding Satisfying Assignments: Two Are Better than One , 2004, AAAI.
[78] Y. Zhu,et al. A Local-Concentration-Based Feature Extraction Approach for Spam Filtering , 2011, IEEE Transactions on Information Forensics and Security.
[79] Hao Jiang,et al. A Novel Negative Location Collection Method for Finding Aggregated Locations , 2018, IEEE Transactions on Intelligent Transportation Systems.
[80] Julie Greensmith,et al. Theoretical Formulation and Analysis of the Deterministic Dendritic Cell Algorithm , 2013, Biosyst..
[81] Arijit Chaudhuri,et al. Indirect Questioning in Sample Surveys , 2013 .
[82] Gary G. Yen,et al. Constrained Optimization Via Artificial Immune System , 2014, IEEE Transactions on Cybernetics.
[83] Thad Starner. The Challenges of Wearable Computing: Part 2 , 2001, IEEE Micro.
[84] Claudia Eckert,et al. An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.
[85] Emma Hart,et al. An improved immune inspired hyper-heuristic for combinatorial optimisation problems , 2014, GECCO.
[86] Henri Pierreval,et al. Fault detection, diagnosis and recovery using Artificial Immune Systems: A review , 2015, Eng. Appl. Artif. Intell..
[87] Kaoru Sezaki,et al. Limited Negative Surveys: Privacy-preserving participatory sensing , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).
[88] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[89] Wenjian Luo,et al. PTS-RNSA: A Novel Detector Generation Algorithm for Real-Valued Negative Selection Algorithm , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.
[90] Dong Li,et al. Negative selection algorithm with constant detectors for anomaly detection , 2015, Appl. Soft Comput..
[91] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[92] Cyril Onwubiko,et al. Functional requirements of situational awareness in computer network security , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[93] Dipankar Dasgupta,et al. A Survey of Recent Works in Artificial Immune Systems , 2016 .
[94] Vincenzo Cutello,et al. An Immune Algorithm for Protein Structure Prediction on Lattice Models , 2007, IEEE Transactions on Evolutionary Computation.
[95] Wenjian Luo,et al. Real-Valued Negative Databases , 2013, ECAL.
[96] Ran Liu,et al. Negative Survey-Based Privacy Protection of Cloud Data , 2015, ICSI.
[97] Zhou Ji,et al. Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[98] Dipankar Dasgupta,et al. Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[99] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[100] Paul Helman,et al. On-line Negative Databases , 2004, Int. J. Unconv. Comput..
[101] Ran Liu,et al. Hiding multiple solutions in a hard 3-SAT formula , 2015, Data Knowl. Eng..
[102] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[103] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[104] Fabio A. González,et al. The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.
[105] Maoguo Gong,et al. An efficient negative selection algorithm with further training for anomaly detection , 2012, Knowl. Based Syst..
[106] Zhang-Zan Jin,et al. Survey of negative selection algorithms , 2013 .
[107] Jonathan Timmis,et al. A modified Dendritic Cell Algorithm for on-line error detection in robotic systems , 2009, 2009 IEEE Congress on Evolutionary Computation.
[108] Bart Selman,et al. Local search strategies for satisfiability testing , 1993, Cliques, Coloring, and Satisfiability.
[109] Paul Helman,et al. Protecting data privacy through hard-to-reverse negative databases , 2007, International Journal of Information Security.
[110] Ali Selamat,et al. Improved email spam detection model with negative selection algorithm and particle swarm optimization , 2014, Appl. Soft Comput..
[111] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[112] Akihiko Ohsuga,et al. Privacy Preservation for Participatory Sensing Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[113] Víctor M. Guerrero,et al. Surveys with negative questions for sensitive items , 2009 .
[114] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[115] Stephanie Forrest,et al. Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[116] Guilherme Costa Silva,et al. Immune inspired Fault Detection and Diagnosis: A fuzzy-based approach of the negative selection algorithm and participatory clustering , 2012, Expert Syst. Appl..
[117] Sharad Malik,et al. Zchaff2004: An Efficient SAT Solver , 2004, SAT (Selected Papers.
[118] Mario G. Perhinschi,et al. Structured non-self approach for aircraft failure identification within a fault tolerance architecture , 2016 .
[119] Dipankar Dasgupta,et al. Artificial immune systems in industrial applications , 1999, Proceedings of the Second International Conference on Intelligent Processing and Manufacturing of Materials. IPMM'99 (Cat. No.99EX296).
[120] Ran Liu,et al. A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[121] Ran Liu,et al. Experimental analyses of the K-hidden algorithm , 2017, Eng. Appl. Artif. Intell..
[122] Hugues Bersini,et al. Hints for Adaptive Problem Solving Gleaned from Immune Networks , 1990, PPSN.
[123] Lars Kulik,et al. Privacy-aware collection of aggregate spatial data , 2011, Data Knowl. Eng..
[124] Ying Tan,et al. A Virus Detection System Based on Artificial Immune System , 2009, 2009 International Conference on Computational Intelligence and Security.