Recent Advances in Artificial Immune Systems: Models and Applications
暂无分享,去创建一个
[1] Liangpei Zhang,et al. A Supervised Artificial Immune Classifier for Remote-Sensing Imagery , 2007, IEEE Transactions on Geoscience and Remote Sensing.
[2] John E. Hunt,et al. Learning using an artificial immune system , 1996 .
[3] Fernando José Von Zuben,et al. omni-aiNet: An Immune-Inspired Approach for Omni Optimization , 2006, ICARIS.
[4] Leandro Nunes de Castro,et al. An Overview of Artificial Immune Systems , 2004 .
[5] Jon Timmis,et al. A Multi-Layered Immune Inspired Approach to Data Mining , 2003 .
[6] Uwe Aickelin,et al. Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.
[7] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[8] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[9] Uwe Aickelin,et al. The motif tracking algorithm , 2008, Int. J. Autom. Comput..
[10] Yunong Zhang,et al. An Efficient Artificial Immune Network with Elite-Learning , 2007, Third International Conference on Natural Computation (ICNC 2007).
[11] Yang Wang,et al. Research on Vehicle Image Classifier Based on Concentration Regulating of Immune Clonal Selection , 2008, 2008 Fourth International Conference on Natural Computation.
[12] Hussein A. Abbass,et al. Data Mining: A Heuristic Approach , 2002 .
[13] Jamie Paul Twycross,et al. Integrated innate and adaptive artificial immune systems applied to process anomaly detection , 2007 .
[14] Wenjian Luo,et al. On convergence of Evolutionary Negative Selection Algorithms for anomaly detection , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).
[15] Fernando José Von Zuben,et al. Feature Subset Selection by Means of a Bayesian Artificial Immune System , 2008, 2008 Eighth International Conference on Hybrid Intelligent Systems.
[16] Sugata Sanyal,et al. Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[17] L. Albergante,et al. Wireless discussion forums: Automatic management via artificial immune systems , 2008, 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems.
[18] Ulrich Behn,et al. Randomly Evolving Idiotypic Networks: Analysis of Building Principles , 2006, ICARIS.
[19] Julie Greensmith,et al. The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.
[20] Zongyuan Mao,et al. An Artificial Immune Network Approach for Pattern Recognition , 2007, Third International Conference on Natural Computation (ICNC 2007).
[21] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[22] Nur Izura Udzir,et al. Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification , 2008, ICARIS.
[23] Jonathan Timmis,et al. Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..
[24] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[25] Julie Greensmith,et al. Dendritic cells for SYN scan detection , 2007, GECCO '07.
[26] Bin Li,et al. A hardware/software partitioning algorithm based on artificial immune principles , 2008, Appl. Soft Comput..
[27] Jonathan Timmis,et al. Application areas of AIS: The past, the present and the future , 2008, Appl. Soft Comput..
[28] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[29] Fernando José Von Zuben,et al. MOBAIS: A Bayesian Artificial Immune System for Multi-Objective Optimization , 2008, ICARIS.
[30] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[31] Julie Greensmith,et al. Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.
[32] Leandro Nunes de Castro,et al. aiNet: An Artificial Immune Network for Data Analysis , 2002 .
[33] Fernando José Von Zuben,et al. Multi-objective Bayesian Artificial Immune System: Empirical Evaluation and Comparative Analyses , 2009, J. Math. Model. Algorithms.
[34] Markus Brede,et al. Patterns in randomly evolving networks: idiotypic networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[35] Julian F. Miller,et al. Genetic and Evolutionary Computation Conference 2008 : GECCO 2008 , 2008, GECCO 2008.
[36] Senhua Yu,et al. Artificial Immune Systems: A Bibliography , 2010 .
[37] Ricardo Tanscheit,et al. Real-Valued Negative Selection Algorithm with a Quasi-Monte Carlo Genetic Detector Generation , 2007, ICARIS.
[38] Zhengxuan Wang,et al. ICAIS: A Novel Incremental Clustering Algorithm Based on Artificial Immune Systems , 2008, 2008 International Conference on Internet Computing in Science and Engineering.
[39] A. B. Watkins,et al. A resource limited artificial immune classifier , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[40] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[41] Victor A. Skormin,et al. Immunocomputing - principles and applications , 2003 .
[42] Giuseppe Nicosia,et al. An Advanced Clonal Selection Algorithm with Ad-Hoc Network-Based Hypermutation Operators for Synthesis of Topology and Sizing of Analog Electrical Circuits , 2008, ICARIS.
[43] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[44] M. Karakose,et al. Artificial immune based support vector machine algorithm for fault diagnosis of induction motors , 2007, 2007 International Aegean Conference on Electrical Machines and Power Electronics.
[45] M. Kapsenberg. Dendritic-cell control of pathogen-driven T-cell polarization , 2003, Nature Reviews Immunology.
[46] Thomas Stibor,et al. An Empirical Study of Self/Non-self Discrimination in Binary Data with a Kernel Estimator , 2008, ICARIS.
[47] Fabio Freschi,et al. Multiobjective Optimization and Artificial Immune Systems: A Review , 2009 .
[48] Muhammad Zubair Shafiq,et al. Improving accuracy of immune-inspired malware detectors by using intelligent features , 2008, GECCO '08.
[49] Krzysztof Ciesielski,et al. An Immune Network for Contextual Text Data Clustering , 2006, ICARIS.
[50] Jonathan Timmis,et al. The Immune System in Pieces: Computational Lessons from Degeneracy in the Immune System , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[51] Alex Alves Freitas,et al. An Artificial Immune System for Evolving Amino Acid Clusters Tailored to Protein Function Prediction , 2008, ICARIS.
[52] Luis Mateus Rocha,et al. Adaptive Spam Detection Inspired by a Cross-Regulation Model of Immune Dynamics: A Study of Concept Drift , 2008, ICARIS.
[53] Z. Cao,et al. Computer prediction of allergen proteins from sequence-derived protein structural and physicochemical properties. , 2007, Molecular immunology.
[54] J Timmis,et al. An artificial immune system for data analysis. , 2000, Bio Systems.
[55] Jonathan Timmis,et al. An Investigation on the Compression Quality of aiNet , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[56] Julie Greensmith,et al. Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.
[57] Senhua Yu,et al. Conserved Self Pattern Recognition Algorithm , 2008, ICARIS.
[58] Fabio A. González,et al. An Novel Artificial Immune System Approach to Robust Data Mining , 2002, GECCO Late Breaking Papers.
[59] Hua Li,et al. Medical Image Registration Based on More Features and Artificial Immune Algorithm , 2009, 2009 International Joint Conference on Artificial Intelligence.
[60] Rongfang Bie,et al. Artificial Immune Recognition System for DNA Microarray Data Analysis , 2008, 2008 Fourth International Conference on Natural Computation.
[61] Doheon Lee,et al. AIS-Based Bootstrapping of Bayesian Networks for Identifying Protein Energy Route , 2008, ICARIS.
[62] Ya-Jing Zhang,et al. A Gene Immune Detection Algorithm with Complement Operator on the Basis of Biological Immune Principles , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[63] Jon Timmis,et al. Artificial Immune Recognition System (AIRS): Revisions and Refinements , 2002 .
[64] Yoshiteru Ishida. Immunity-Based Systems: A Design Perspective , 2010 .
[65] Azuraliza Abu Bakar,et al. Flexible Immune Network Recognition System for Mining Heterogeneous Data , 2008, ICARIS.
[66] Simon M. Garrett,et al. How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.
[67] Alex A. Freitas,et al. Towards a Danger Theory Inspired Artificial Immune System for Web Mining , 2005 .
[68] W. Wilfred Godfrey,et al. An Immune System Based Multi-robot Mobile Agent Network , 2008, ICARIS.
[69] Muddassar Farooq,et al. A sense of danger: dendritic cells inspired artificial immune system for manet security , 2008, GECCO '08.
[70] Uwe Aickelin,et al. An Idiotypic Immune Network as a Short-Term Learning Architecture for Mobile Robots , 2008, ICARIS.
[71] C. Janeway. Approaching the asymptote? Evolution and revolution in immunology. , 1989, Cold Spring Harbor symposia on quantitative biology.
[72] Dipankar Dasgupta,et al. Immunological Computation: Theory and Applications , 2008 .
[73] Mohd Aizaini Maarof,et al. Danger Theory and Intelligent Data Processing , 2007 .
[74] Jialei Wang,et al. Study on Multi Agent Recognizer Model Based on Immune RBF Neural Network , 2007, 2007 IEEE International Conference on Control and Automation.
[75] C. Janeway,et al. The immune system evolved to discriminate infectious nonself from noninfectious self. , 1992, Immunology today.
[76] Camilo Eduardo Prieto,et al. A goalkeeper strategy in robot soccer based on Danger Theory , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).
[77] Yiwen Liang,et al. A Novel Intrusion Detection Model Based on Danger Theory , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[78] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[79] L.N. de Castro,et al. An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[80] Vincenzo Cutello,et al. An Immune Algorithm for Protein Structure Prediction on Lattice Models , 2007, IEEE Transactions on Evolutionary Computation.
[81] Bo Chen,et al. Unsupervised Structure Damage Classification Based on the Data Clustering and Artificial Immune Pattern Recognition , 2009, ICARIS.
[82] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[83] Fernando José Von Zuben,et al. BAIS: A Bayesian Artificial Immune System for the effective handling of building blocks , 2009, Inf. Sci..
[84] Amiya Nayak,et al. Network Fault Diagnosis: An Artificial Immune System Approach , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.
[85] S.J. Ovaska,et al. Genetic Algorithms-based Detector Generation in Negative Selection Algorithm , 2006, 2006 IEEE Mountain Workshop on Adaptive and Learning Systems.
[86] Jonathan Timmis. Artificial immune systems : a novel data analysis technique inspired by the immune network theory , 2000 .
[87] Liu Xuepeng. Immune PI control on PMSM speed regulating system , 2008, 2008 7th World Congress on Intelligent Control and Automation.
[88] Luiz E. Souza,et al. Dynamic Polymorphic Agents Scheduling and Execution Using Artificial Immune Systems , 2008, ICARIS.
[89] Jonathan Timmis,et al. A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..
[90] R. Romero,et al. Artificial Immune Systems Applied to Optimal Capacitor Placement in Radial Distribution Networks , 2006, 2006 IEEE/PES Transmission & Distribution Conference and Exposition: Latin America.
[91] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[92] Wei Wang,et al. A Complex Artificial Immune System , 2008, 2008 Fourth International Conference on Natural Computation.
[93] Anthony Scime. Web Mining: Applications and Techniques , 2004 .
[94] Han Yu. Optimizing task schedules using an artificial immune system approach , 2008, GECCO '08.
[95] Pascal Bouvry,et al. Immune anomaly detection enhanced with evolutionary paradigms , 2006, GECCO.
[96] Julie Greensmith,et al. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems , 2010, ArXiv.
[97] Julie Greensmith,et al. Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows , 2008, ICARIS.
[98] José Félix Costa,et al. The Abstract Immune System Algorithm , 2007, UC.
[99] Julian F. Miller,et al. Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.
[100] Jonathan Timmis,et al. AINE: an immunological approach to data mining , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[101] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[102] Leandro Nunes de Castro,et al. A Neuro-Immune Algorithm to Solve the Capacitated Vehicle Routing Problem , 2008, ICARIS.
[103] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[104] T. Kenakin,et al. G Protein-Coupled Receptor Allosterism and Complexing , 2002, Pharmacological Reviews.
[105] Xin Wang,et al. A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for Each Detector , 2006, PPSN.
[106] Thomas Stibor,et al. Phase Transition and the Computational Complexity of Generating r -Contiguous Detectors , 2007, ICARIS.
[107] Fernando Buarque de Lima Neto,et al. How to Obtain Appropriate Executive Decisions Using Artificial Immunologic Systems , 2007, ICARIS.
[108] Chi-Yuan Lin,et al. Application of Artificial Immune System Approach in MRI Classification , 2008, EURASIP J. Adv. Signal Process..
[109] Fabio A. González,et al. A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning , 2003, GECCO.
[110] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[111] Wenjian Luo,et al. On average time complexity of evolutionary negative selection algorithms for anomaly detection , 2009, GEC '09.
[112] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[113] Yoshiteru Ishida. Fully distributed diagnosis by PDP learning algorithm: towards immune network PDP model , 1990, 1990 IJCNN International Joint Conference on Neural Networks.
[114] Muhammad Zubair Shafiq,et al. A Sense of 'Danger' for Windows Processes , 2009, ICARIS.
[115] Mo-Yuen Chow,et al. Clonal Optimization of Negative Selection Algorithm with Applications in Motor Fault Detection , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[116] Senhua Yu,et al. MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.
[117] Alair Pereira do Lago,et al. Credit Card Fraud Detection with Artificial Immune System , 2008, ICARIS.
[118] Jon Timmis,et al. Jisys: The Envelopment of an Artificial Immune System for Real World Applications , 1999 .
[119] Mohammad Mehdi Ebadzadeh,et al. A Hybrid Fuzzy Neuro-Immune Network based on Multi-Epitope approach , 2009, 2009 International Joint Conference on Neural Networks.
[120] Wenjian Luo,et al. A Heuristic Detector Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rule , 2006, ICARIS.
[121] Pascal Bouvry,et al. Coevolutionary-based Mechanisms for Network Anomaly Detection , 2007, J. Math. Model. Algorithms.
[122] Maoguo Gong,et al. Multiobjective Immune Algorithm with Nondominated Neighbor-Based Selection , 2008, Evolutionary Computation.
[123] Uwe Aickelin,et al. Price Trackers Inspired by Immune Memory , 2006, ICARIS.
[124] Fernando José Von Zuben,et al. Multi-objective feature selection using a Bayesian artificial immune system , 2010, Int. J. Intell. Comput. Cybern..
[125] Xin Wang,et al. A Novel Fast Negative Selection Algorithm Enhanced by State Graphs , 2007, ICARIS.
[126] Hong-Zhou Tan,et al. A Hybrid Artificial Immune Network with Swarm Learning , 2007, 2007 International Conference on Communications, Circuits and Systems.
[127] Andries P. Engelbrecht,et al. Optimised Coverage of Non-self with Evolved Lymphocytes in an Artificial Immune System , 2006 .
[128] Mark Neal,et al. An artificial immune system for continuous analysis of time-varying data , 2002 .
[129] Julie Greensmith,et al. Sensing Danger: Innate Immunology for Intrusion Detection , 2007, Inf. Secur. Tech. Rep..
[130] Julie Greensmith,et al. The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.
[131] Beatriz S. L. P. de Lima,et al. Optimization of Steel Catenary Risers for Offshore Oil Production Using Artificial Immune System , 2008, ICARIS.
[132] Fabrício Olivetti de França,et al. A Multi-Objective Multipopulation Approach for Biclustering , 2008, ICARIS.
[133] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[134] Claudia Eckert,et al. Generalization Regions in Hamming Negative Selection , 2006, Intelligent Information Systems.
[135] A. B. Watkins,et al. A new classifier based on resource limited artificial immune systems , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[136] Jonathan Timmis,et al. Immune and Evolutionary Approaches to Software Mutation Testing , 2007, ICARIS.
[137] Yoshiteru Ishida,et al. Immunity-Based Systems , 2004, Advanced Information Processing.
[138] Yimin Chen,et al. A Virtual and Real HCI System Based on Artificial Immune System , 2008, 2008 Second International Conference on Genetic and Evolutionary Computing.
[139] R. Caflisch,et al. Quasi-Monte Carlo integration , 1995 .
[140] Melvin Cohn,et al. A Theory of Self-Nonself Discrimination , 1970, Science.
[141] Tao Liu,et al. A Modified Resource Limited Artificial Immune System , 2008, 2008 International Symposium on Electronic Commerce and Security.
[142] Jonathan Timmis,et al. An interdisciplinary perspective on artificial immune systems , 2008, Evol. Intell..
[143] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[144] Wanli Ma,et al. Negative Selection with Antigen Feedback in Intrusion Detection , 2008, ICARIS.
[145] Ki-Won Yeom,et al. Immune-inspired Algorithm for Anomaly Detection , 2007, Computational Intelligence in Information Assurance and Security.
[146] Tao Xiong,et al. A combined SVM and LDA approach for classification , 2005, Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005..
[147] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[148] Henry Y. K. Lau,et al. AIS Based Distributed Wireless Sensor Network for Mobile Search and Rescue Robot Tracking , 2008, ICARIS.
[149] Claudia Eckert,et al. On Permutation Masks in Hamming Negative Selection , 2006, ICARIS.
[150] Gilbert L. Peterson,et al. An Evolutionary Algorithm to Generate Ellipsoid Detectors for Negative Selection , 2012 .
[151] F. Burnet. The clonal selection theory of acquired immunity , 1959 .
[152] Jonathan Timmis,et al. A Neuro-Immune Inspired Robust Real Time Visual Tracking System , 2008, ICARIS.
[153] Saeed Bagheri Shouraki,et al. An artificial immune system with partially specified antibodies , 2007, GECCO '07.