Negative Selection Algorithm Based on Antigen Density Clustering
暂无分享,去创建一个
Lin Jia | Chao Yang | Bing-Qiu Chen | Hai-Yang Wen | Bing-Qiu Chen | Chao Yang | Lin Jia | Hai-Yang Wen
[1] Zhang-Zan Jin,et al. Survey of negative selection algorithms , 2013 .
[2] Wenjing Liu,et al. A Negative Selection Algorithm-Based Identification Framework for Distribution Network Faults With High Resistance , 2019, IEEE Access.
[3] Zhou Ji,et al. V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..
[4] Zhengjun Liu,et al. An Improved Negative Selection Algorithm Based on Subspace Density Seeking , 2017, IEEE Access.
[5] Marin Emilov Pamukov,et al. Negative Selection and Neural Network Based Algorithm for Intrusion Detection in IoT , 2018, 2018 41st International Conference on Telecommunications and Signal Processing (TSP).
[6] Sean Hughes,et al. Clustering by Fast Search and Find of Density Peaks , 2016 .
[7] Yang Jin,et al. dnyNSA: A Novel Real-Value Based Negative Selection Algorithm , 2018, 2018 IEEE Symposium Series on Computational Intelligence (SSCI).
[8] Harish Garg,et al. Predicting Crude Oil Price Using Fuzzy Rough Set and Bio-Inspired Negative Selection Algorithm , 2019, Int. J. Swarm Intell. Res..
[9] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[10] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Li Tao,et al. An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm , 2019, IEEE Access.
[12] Fabio A. González,et al. A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.
[13] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[14] Tao Li,et al. A negative selection algorithm based on hierarchical clustering of self set , 2011, Science China Information Sciences.
[15] Gerry V. Dozier,et al. Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers , 2007, Appl. Soft Comput..
[16] Jun He,et al. A hybrid artificial immune system and Self Organising Map for network intrusion detection , 2008, Inf. Sci..
[17] Muhammad Tahir Khan,et al. Layered and Real-Valued Negative Selection Algorithm for Fault Detection , 2018, IEEE Systems Journal.