[1] |
YANG Yong, ZHANG Lei, QU Fuheng, LIU Junjie, CHEN Qiang.
THIMFUP Algorithm Based on the Most Frequent Item Extraction and Candidate Set Pruning
[J]. Journal of Jilin University Science Edition, 2021, 59(3): 635-642.
|
[2] |
JIN Xiaomin, ZHANG Liping.
Multilevel k-Means Clustering Algorithm Based onMinimum Spanning Tree and Its Application in Data Mining#br#
[J]. Journal of Jilin University Science Edition, 2018, 56(5): 1187-1192.
|
[3] |
FENG Feng, ZHANG Longyao, ZHANG Qing.
Description and Mining Method of Maximal Association RulesBased on Logical Formulas on Soft Sets
[J]. Journal of Jilin University Science Edition, 2018, 56(4): 901-908.
|
[4] |
KUANG Zhenchun, XIAN Yuanqing.
Multidimensional Extended Greedy AlgorithmBased on XML Configuration Framework
[J]. Journal of Jilin University Science Edition, 2018, 56(3): 688-691.
|
[5] |
SHANG Jingbo, ZUO Wanli.
A Novel Matching Clustering Algorithm Based onClear Rational Number Mean
[J]. Journal of Jilin University Science Edition, 2018, 56(2): 399-401.
|
[6] |
WANG Wenxia.
Improved C45 Decision Tree Classification Algorithm in Data Mining
[J]. Journal of Jilin University Science Edition, 2017, 55(05): 1274-1277.
|
[7] |
ZHOU Peng, XIONG Yunyu.
Anomaly Detection of Network State Based on Data Mining
[J]. Journal of Jilin University Science Edition, 2017, 55(05): 1269-1273.
|
[8] |
SUN Jinling, PANG Juan.
Application of Gray Neural Network Based onResidual Correction in Data Mining
[J]. Journal of Jilin University Science Edition, 2015, 53(06): 1263-1268.
|
[9] |
GUO Qibiao, LI Bingjian.
Network Intrusion Detection Based on AkaikeInformation Criterion and BP Algorithm
[J]. Journal of Jilin University Science Edition, 2015, 53(04): 715-719.
|
[10] |
YU Xiaodi, Nurbol, HU Liang, XIE Nannan.
An Intrusion Alert Correlation Model Based on Data Mining
[J]. Journal of Jilin University Science Edition, 2013, 51(05): 881-886.
|
[11] |
XU Chu-Tan, WANG Chao-Yong, SUN Yan-Feng.
An Improved AntMiner Algorithm for Unbalanced Data
[J]. J4, 2011, 49(04): 733-739.
|
[12] |
HU Liang, JIN Gang, YU Man, REN Fei, REN Weiwu.
Techniques of IDS Based on Anomaly Detection
[J]. J4, 2009, 47(6): 1264-1270.
|
[13] |
DONG Li-Yan, LI Zhen, YAN Feng-Fei.
Identification of Major Hazards Based on Bayesian Classifier
[J]. J4, 2009, 47(4): 795-799.
|
[14] |
ZHANG Qiang, LI Yongli, DONG Liyan, LI Wei, ZHANG Xiao hui.
Outlier Testing Methods Based on Weighted Hypergraph
[J]. J4, 2007, 45(04): 611-616.
|
[15] |
LI Yongli,, REN Huiming, DONG Liyan, LI Wei, CHEN Siguo, ZHAO Yu.
Outlier Testing Method Based on Pattern Clustering Algorithm
[J]. J4, 2007, 45(03): 435-437.
|