Intelligent Network Awareness
暂无分享,去创建一个
[1] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[2] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[3] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[4] Haipeng Yao,et al. NetworkAI: An Intelligent Network Architecture for Self-Learning Control Strategies in Software Defined Networks , 2018, IEEE Internet of Things Journal.
[5] Jie Wu,et al. Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.
[6] Haipeng Yao,et al. The Space-Terrestrial Integrated Network: An Overview , 2018, IEEE Communications Magazine.
[7] Trevor Hastie,et al. An Introduction to Statistical Learning , 2013, Springer Texts in Statistics.
[8] J. Alberto Espinosa,et al. Big Data: Issues and Challenges Moving Forward , 2013, 2013 46th Hawaii International Conference on System Sciences.
[9] Victor C. M. Leung,et al. Learning-Aided Network Association for Hybrid Indoor LiFi-WiFi Systems , 2018, IEEE Transactions on Vehicular Technology.
[10] Keith W. Miller,et al. Big Data: New Opportunities and New Challenges [Guest editors' introduction] , 2013, Computer.
[11] Haipeng Yao,et al. Virtual Network Embedding Based on the Degree and Clustering Coefficient Information , 2016, IEEE Access.
[12] Ning Ge,et al. Non-Orthogonal Multiple Access Based Integrated Terrestrial-Satellite Networks , 2017, IEEE Journal on Selected Areas in Communications.
[13] Jianhua Lu,et al. Two-Phase Task Scheduling in Data Relay Satellite Systems , 2018, IEEE Transactions on Vehicular Technology.
[14] Xi Chen,et al. Radio Resource Management in Future Terrestrial-Satellite Communication Networks , 2017, IEEE Wireless Communications.
[15] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[16] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[17] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[18] Liang He,et al. An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.
[19] Xu Chen,et al. A novel reinforcement learning algorithm for virtual network embedding , 2018, Neurocomputing.
[20] H. Vincent Poor,et al. Community-Structured Evolutionary Game for Privacy Protection in Social Networks , 2018, IEEE Transactions on Information Forensics and Security.
[21] Wathiq Laftah Al-Yaseen,et al. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..
[22] Haipeng Yao,et al. Virtual network embedding based on modified genetic algorithm , 2019, Peer-to-Peer Netw. Appl..
[23] Wei Fan,et al. Mining big data: current status, and forecast to the future , 2013, SKDD.
[24] Jun Du,et al. Contract Design for Traffic Offloading and Resource Allocation in Heterogeneous Ultra-Dense Networks , 2017, IEEE Journal on Selected Areas in Communications.
[25] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[26] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[27] Sam Kwong,et al. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.
[28] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[29] Chunxiao Jiang,et al. DYWAMIT: Asynchronous Wideband Dynamic Spectrum Sensing and Access System , 2017, IEEE Systems Journal.
[30] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[31] Simon Fong,et al. DBSCAN: Past, present and future , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).
[32] Haipeng Yao,et al. MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System , 2019, IEEE Internet of Things Journal.
[33] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[34] Xu Rongsheng,et al. Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework , 2006, 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06).
[35] Shankar Chakraborty,et al. A knowledge-based system for end mill selection , 2016 .
[36] Haipeng Yao,et al. Virtual Network Embedding Using Node Multiple Metrics Based on Simplified ELECTRE Method , 2018, IEEE Access.
[37] Haipeng Yao,et al. A feature selection method based on synonym merging in text classification system , 2017, EURASIP J. Wirel. Commun. Netw..
[38] Miran Brezocnik,et al. Genetic Based Approach to Predicting the Elongation of Drawn Alloy , 2015 .
[39] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[40] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[41] Zhu Han,et al. Internet of Vehicles: Sensing-Aided Transportation Information Collection and Diffusion , 2018, IEEE Transactions on Vehicular Technology.
[42] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[43] Zhu Han,et al. Taking Drones to the Next Level: Cooperative Distributed Unmanned-Aerial-Vehicular Networks for Small and Mini Drones , 2017, IEEE Vehicular Technology Magazine.
[44] G. D. Yu,et al. Multi-Objective Rescheduling Model for Product Collaborative Design Considering Disturbance , 2014 .
[45] Nik Bessis,et al. A Survey of Intrusion Detection Systems for Mobile Ad Hoc Networks , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[46] Jugal K. Kalita,et al. MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method , 2014, Comput. J..
[47] Maurice K. Wong,et al. Algorithm AS136: A k-means clustering algorithm. , 1979 .
[48] Jianhua Lu,et al. Cooperative Multigroup Multicast Transmission in Integrated Terrestrial-Satellite Networks , 2018, IEEE Journal on Selected Areas in Communications.
[49] Lajos Hanzo,et al. Vehicular Sensing Networks in a Smart City: Principles, Technologies and Applications , 2018, IEEE Wireless Communications.
[50] Hari Om,et al. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[51] Carey L. Williamson,et al. Offline/realtime traffic classification using semi-supervised learning , 2007, Perform. Evaluation.
[52] Jun Du,et al. Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative Beamforming , 2018, IEEE Journal on Selected Areas in Communications.
[53] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[54] Michael Y. Hu,et al. Forecasting with artificial neural networks: The state of the art , 1997 .
[55] Sheng Wu,et al. Topology based reliable virtual network embedding from a QoE perspective , 2018, China Communications.
[56] Haipeng Yao,et al. Big Data Analytics in Mobile Cellular Networks , 2016, IEEE Access.
[57] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..