Reference:
WANG Junhong, YAN Jiarong. Classification algorithm based on undersampling and cost-sensitiveness for unbalanced data[J]. Journal of Computer Applications, 2021, 41(1): 48-52. LI Yanxia, CHAI Yi, HU Youqiang, et al. Review of imbalanced data classification methods[J]. Control and Decision, 2019, 34(4):673-688. WU Yuanyuan, SHEN Liyong. Imbalanced fuzzy multiclass support vector machine algorithm based on class-overlap degree undersampling[J]. Journal of University of Chinese Academy of Sciences, 2018, 35(4):536-543. Zhang Liancheng, Wei Qiang, Tang Xiucun, et al. Path and Port Address Hopping Based SDN Proactive Defense Technology[J]. Journal of Computer Research and Development,2017,54(12):2761-2771. LI Longjie, YU Yang, BAI Shenshen, et al. Intrusion Detection Model Based on Double Training Technique[J]. Transactions of Beijing Institute of Technology,2017,37(12):1246-1252. LI Xin, DUAN Yongcheng. Network Security Situation Assessment Method Based on Improved Hidden Markov Model[J]. Computer Science, 2020, 47(7): 287-291. NIE Xichan, ZHANG Yang, YU Dunhui, et al. Spatial crowdsourcing task allocation algorithm for global optimization[J]. Journal of Computer Applications, 2020, 40(7): 1950-1958. SONG TianShu, TONG YongXin, WANG LiBin, et al. Online Task Assignment for Three Types of Objects under Spatial Crowdsourcing Environment[J]. Journal of Software,2017,28(3):611-630. CHENG Lei, GAO Maoting. Hybrid Recommendation Algorithm Based on Time Weighted and LDA Clustering[J]. Computer Engineering and Applications, 2019, 55(11):160-166. AL-SAFFAR A A M,TAO H,TALAB M A. Review of deep convolution neural network in image classification[C]//Proceedings of the 2017 International Conference on Radar,Antenna,Microwave,Electronics,and Telecommunications. Piscataway:IEEE, 2017:26-31. XU Xiaoyan. Design of network security situation assessment platform based on the improved game model[J]. Modern Electronics Technique, 2016, 39(12):87-90. QIN Jing, AN Wen, JI Changqing, et al. Review of privacy protection mechanisms in wireless body area network[J]. Journal of Computer Applications, 2021, 41(4): 970-975. SONG Yong, CAI Zhiping. Normalized Method of Intrusion Detection Data Based on Information Theory in Big Data Environment[J].Journal of Wuhan University(Natural Science Edition),2018,64(02):121-126.
|