›› 2012, Vol. 42 ›› Issue (05): 1251-1256.
Previous Articles Next Articles
CHAI Zheng-yi1,2, WU Hui-xin3, WU-Yong1
CLC Number:
| [1] 柴争义,王献荣,王亮.用于异常检测的实值否定选择算法[J].吉林大学学报:工学版,2012,42(1):176-181. Chai Zheng-yi, Wang Xian-rong, Wang Liang. Real-value negative selection algorithm for anomaly detection[J]. Journal of Jilin University(Engineering and Technology Edition),2012,42(1):176-181. [2] Bereta M, Burczy'nski T. Comparing binary and real-valued coding in hybrid immune algorithm for feature selection and classification of ECG signals[J].Engineering Applications of Artificial Intelligence, 2008,20(5):571-585. [3] Gonzalez F, Dasgupta D, Nino L F. A randomized real-valued negative selection algorithm//ICARIS 2003, Edinburgh, UK, 2007: 376-383. [4] Zhang Feng-bin, Wang Da-wei, Wang Sheng-wen. A self region based real-valued negative selection algorithm[J].Journal of Harbin Institute of Technology, 2009,15(6):851-855. [5] Zhou Ji, Dasgupta D. Real-valued negative selection algorithm with variable-sized detectors//Proceedings of GECCO, LNCS 3102. Berlin: Springer, 2008: 287-298. [6] Chmielewski A, Wierzcho S T. V-detector algorithm with tree-based structures//Proccedings of the International Conference on Computer Science and Information Technology. Wisa, Poland, 2009:9-14. [7] Zeng Jin-quan, Liu Xiao-jie, Li Tao. A self-adaptive negative selection algorithm used for anomaly detection[J].Progress in Natural Science,2009,19(2),261-266. [8] Wang Yu-jian, Luo Wen-jian. PTS-RNSA: A novel detector generation algorithm for real-valued negative selection algorithm//2010 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.USA,IEEE Press, 2010:61-66. [9] Balachandran S, Dasgupta D, Nino L F, et al. A general framework for evolving multi-shaped detectors in negative selection//Proc of the 2009 IEEE Symposium Series on Foundations of Computational Intelligence, FOCI-2008. Honolulu, Hawaii, 2009:401-408. [10] Zhou Ji, Dasgupta D. An efficient negative selection algorithm with probably adequate detector coverage[J].Information Sciences, 2009,17(9):1390-1406. [11] 盛骤,谢式千,潘承毅.概率论与数理统计[M].北京:高等教育出版社,2005. [12] 史宁中.统计检验的理论与方法[M].北京:科学出版社,2010. [13] Columbia University. 2DSyntheticData.. http://www. zhouji. net/prof/2DSyntheticData.zip. [14] StatLib Datasets Archive. http://lib.stat.cmu.edu//dataset. 2010-04-12. [15] 刘大有,谷方明,王生生.基于人工免疫核聚类的支持向量数据描述方法[J].吉林大学学报:工学版,2011,41(5):1369-1373. Liu Da-you, Gu Fang-ming, Wang Sheng-sheng. Support vector data description based on artificial immune kernel clustering[J].Journal of Jilin University(Engineering and Technology Edition),2011,41(5):1369-1373. |
| [1] | DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604. |
| [2] | LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267. |
| [3] | DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272. |
| [4] | DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600. |
| [5] | CAI Hua, CHEN Guang-qiu, LIU Guang-wen, CHENG Shuai, YU Hua-dong. Novelty fragments-based target tracking with multiple instance learning under occlusions [J]. 吉林大学学报(工学版), 2017, 47(1): 281-287. |
| [6] | YU He, QIN Gui-he, SUN Ming-hui, YAN Xin, WANG Xuan-zhe. Cyber security and anomaly detection method for in-vehicle CAN [J]. 吉林大学学报(工学版), 2016, 46(4): 1246-1253. |
| [7] | WANG Yu-lei, ZHAO Chun-hui, QI Bin. Hyperspectral anomaly detection algorithm based on spectral similarity scale [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 148-153. |
| [8] | PANG Hai-yang, LIU Kai-long, WANG Yan-fei. A camouflage effectiveness assessing method based on hypothesis testing and the characteristic of SAR image [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 313-316. |
| [9] | ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340. |
| [10] | WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363. |
| [11] | WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367. |
| [12] | LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242. |
| [13] | LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250. |
| [14] | LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing. Format-preserving encryption for variable-length encoding character data [J]. , 2012, 42(05): 1257-1261. |
| [15] | QU Zhi-guo, WANG Ping, GAO Ying-hui, WANG Peng, SHEN Zhen-kang, LI Jiang. Edge detection based on feature fusion of USAN area [J]. , 2012, (03): 759-765. |
|
||