An Investigation of Information Granulation Techniques in Cybersecurity
暂无分享,去创建一个
[1] Yiyu Yao. A triarchic theory of granular computing , 2016 .
[2] David Hutchison,et al. A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..
[3] Ali Selamat,et al. Contactless Identification System Based on Visual Analysis of Examined Element , 2018, ACIIDS.
[4] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..
[5] Shahrel Azmin Suandi,et al. Fusion of Band Limited Phase Only Correlation and Width Centroid Contour Distance for finger based biometrics , 2014, Expert Syst. Appl..
[6] Ondrej Krejcar,et al. A Comparative Study on Chrominance Based Methods in Dorsal Hand Recognition: Single Image Case , 2018, IEA/AIE.
[7] Witold Pedrycz,et al. Granular Data Description: Designing Ellipsoidal Information Granules , 2017, IEEE Transactions on Cybernetics.
[8] Angelo Gaeta,et al. Resilience Analysis of Critical Infrastructures: A Cognitive Approach Based on Granular Computing , 2019, IEEE Transactions on Cybernetics.
[9] Lotfi A. Zadeh,et al. Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic , 1997, Fuzzy Sets Syst..
[10] Ondrej Krejcar,et al. Online signature verification by spectrogram analysis , 2017, Applied Intelligence.
[11] Witold Pedrycz,et al. Building the fundamentals of granular computing: A principle of justifiable granularity , 2013, Appl. Soft Comput..
[12] Jinfeng Yang,et al. Hierarchical Structure Construction Based on Hyper-sphere Granulation for Finger-Vein Recognition , 2017, CCCV.
[13] M. Jayasree,et al. Recognizing faces from surgically altered face images using granular approach , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[14] Fushuan Wen,et al. Quantitative vulnerability assessment of cyber security for distribution automation systems , 2015 .
[15] Witold Pedrycz,et al. A Design of Granular Takagi–Sugeno Fuzzy Model Through the Synergy of Fuzzy Subspace Clustering and Optimal Allocation of Information Granularity , 2018, IEEE Transactions on Fuzzy Systems.
[16] Jianhua Zhang,et al. Predicting electrical power output by using Granular Computing based Neuro-Fuzzy modeling method , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).
[17] Piotr Synak,et al. Scalable cyber-security analytics with a new summary-based approximate query engine , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[18] Ondrej Krejcar,et al. Fuzzy Granular Classifier Approach for Spam Detection , 2015, ICCCI.
[19] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[20] Yihua Shi,et al. Accurate ROI localization and hierarchical hyper-sphere model for finger-vein recognition , 2019, Neurocomputing.
[21] Ömer Aslan,et al. Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs , 2017, 2017 International Conference on Cyberworlds (CW).
[22] Witold Pedrycz,et al. An overview on the roles of fuzzy set techniques in big data processing: Trends, challenges and opportunities , 2017, Knowl. Based Syst..
[23] Witold Pedrycz,et al. Granulating linguistic information in decision making under consensus and consistency , 2018, Expert Syst. Appl..
[24] Yanan Li,et al. A Multimodal Finger-Based Recognition Method Based on Granular Computing , 2014, CCBR.
[25] Mohammed Elmogy,et al. Rough – Granular Computing knowledge discovery models for medical classification , 2016 .
[26] Witold Pedrycz,et al. Development of information granules of higher type and their applications to granular models of time series , 2018, Eng. Appl. Artif. Intell..
[27] Lei Wang,et al. X-ray astronomical point sources recognition using granular binary-tree SVM , 2016, 2016 IEEE 13th International Conference on Signal Processing (ICSP).
[28] Koen Vanhoof,et al. A Granular Intrusion Detection System Using Rough Cognitive Networks , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[29] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[30] Sandeep K. Sood,et al. An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing , 2017, Enterp. Inf. Syst..
[31] Ondrej Krejcar,et al. Biometrie hand vein estimation using bloodstream filtration and fuzzy e-means , 2017, 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[32] Maysam F. Abbod,et al. Granular computing approach for the design of medical data classification systems , 2015, 2015 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB).
[33] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[34] Jinfeng Yang,et al. A new pixel-based granular fusion method for finger recognition , 2016, International Conference on Digital Image Processing.
[35] Witold Pedrycz,et al. Granular Data Aggregation: An Adaptive Principle of the Justifiable Granularity Approach , 2019, IEEE Transactions on Cybernetics.