Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
暂无分享,去创建一个
[1] Wan-Yu Deng,et al. Cross-person activity recognition using reduced kernel extreme learning machine , 2014, Neural Networks.
[2] Saadiah Yahya,et al. A hybrid intrusion detection system based on different machine learning algorithms , 2013 .
[3] Guoqiang Li,et al. Fast learning network: a novel artificial neural network with a fast learning speed , 2013, Neural Computing and Applications.
[4] Hamid Mohamadi,et al. Design and analysis of genetic fuzzy systems for intrusion detection in computer networks , 2011, Expert Syst. Appl..
[5] Guoqiang Li,et al. Combustion optimization of a coal-fired boiler with double linear fast learning network , 2016, Soft Comput..
[6] Huijuan Lu,et al. A kernel extreme learning machine algorithm based on improved particle swam optimization , 2017, Memetic Comput..
[7] Anirban Sengupta,et al. MO-PSE: Adaptive multi-objective particle swarm optimization based design space exploration in architectural synthesis for application specific processor design , 2014, Adv. Eng. Softw..
[8] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[9] Hongming Zhou,et al. Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] Stephen Cameron,et al. Multi-modal People Detection from Aerial Video , 2013, CORES.
[11] Xia Li,et al. An Adaptive Extreme Learning Machine for Modeling NOx Emission of a 300 MW Circulating Fluidized Bed Boiler , 2017, Neural Processing Letters.
[12] Jeffrey Fan,et al. Ensemble of machine learning algorithms for intrusion detection , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[13] Gang Wang,et al. An efficient hybrid kernel extreme learning machine approach for early diagnosis of Parkinson's disease , 2016, Neurocomputing.
[14] Yang Wang,et al. An adaptive kernel-based weighted extreme learning machine approach for effective detection of Parkinson's disease , 2017, Biomed. Signal Process. Control..
[15] Chi-Man Vong,et al. Fast detection of impact location using kernel extreme learning machine , 2014, Neural Computing and Applications.
[16] David J. Weller-Fahy,et al. Network Intrusion Dataset Assessment , 2013 .
[17] Guang-Bin Huang,et al. Extreme learning machine: a new learning scheme of feedforward neural networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[18] Hui Huang,et al. Toward an optimal kernel extreme learning machine using a chaotic moth-flame optimization strategy with applications in medical diagnoses , 2017, Neurocomputing.
[19] Anirban Sengupta,et al. User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis , 2015, Sixteenth International Symposium on Quality Electronic Design.
[20] Keith Phalp,et al. Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..
[21] Bernhard Schölkopf,et al. Learning with kernels , 2001 .
[22] Shifei Ding,et al. Extreme learning machine and its applications , 2013, Neural Computing and Applications.
[23] Mahdi Zamani,et al. Machine Learning Techniques for Intrusion Detection , 2013, ArXiv.
[24] Timothy A. Warner,et al. Kernel-based extreme learning machine for remote-sensing image classification , 2013 .
[25] Vipul Kumar Mishra,et al. Swarm-inspired exploration of architecture and unrolling factors for nested-loop-based application in architectural synthesis , 2015 .
[26] Vijay Varadharajan,et al. Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..
[27] V. Jaiganesh,et al. Kernelized Extreme Learning Machine with Levenberg-Marquardt Learning Approach towards Intrusion Detection , 2012 .
[28] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[29] Liwei Tang,et al. 2-D defect profile reconstruction from ultrasonic guided wave signals based on QGA-kernelized ELM , 2014, Neurocomputing.
[30] Chen Chen,et al. Spectral-Spatial Classification of Hyperspectral Image Based on Kernel Extreme Learning Machine , 2014, Remote. Sens..
[31] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[32] Xu Zhang,et al. Efficient classification using parallel and scalable compressed model and its application on intrusion detection , 2014, Expert Syst. Appl..
[33] Ioan Cristian Trelea,et al. The particle swarm optimization algorithm: convergence analysis and parameter selection , 2003, Inf. Process. Lett..
[34] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[35] Xianbin Wang,et al. Machine learning techniques for intrusion detection on public dataset , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[36] Jun Gao,et al. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection , 2014, IEEE Transactions on Cybernetics.
[37] Anirban Sengupta,et al. TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling With Optimal Loop Unrolling Factor During High Level Synthesis , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[38] Verónica Bolón-Canedo,et al. Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset , 2011, Expert Syst. Appl..
[39] Shahram Sarkani,et al. MARK-ELM: Application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection , 2015, Expert Syst. Appl..
[40] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[41] Yue Shi,et al. A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).
[42] Wei Li,et al. Hyperspectral image classification by AdaBoost weighted composite kernel extreme learning machines , 2018, Neurocomputing.
[43] Mohammad Javad Golkar,et al. A hybrid method consisting of GA and SVM for intrusion detection system , 2016, Neural Computing and Applications.
[44] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[45] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.