Author of the publication

A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor.

, , , , and . IDAACS-SWS, page 68-72. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Design of Remote Education System Based on CSCW., , , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 1038-1041. Springer, (2003)A Peer-to-Peer Game Model using Punishment Strategies., , , , and . J. Networks, 5 (11): 1357-1364 (2010)LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces., , and . J. Supercomput., 70 (3): 1405-1432 (2014)Image classification based on principal component analysis optimized generative adversarial networks., , , , , and . Multim. Tools Appl., 80 (6): 9687-9701 (2021)Improving Restore Performance for In-Line Backup System Combining Deduplication and Delta Compression., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 31 (10): 2302-2314 (2020)Feature aggregating hashing for image copy detection., , , , , and . World Wide Web, 19 (2): 217-229 (2016)Network Traffic Prediction based on Seq2seq Model., , , , , and . ICCSE, page 710-713. IEEE, (2021)A Method to Optimize the PTN Ring Formation Rate by Calculating the Accounting Income of Network Elements., , , , and . IDAACS, page 28-32. IEEE, (2021)A P2P Traffic Management Model Based on an ISP Game., , , and . J. Comput., 9 (6): 1478-1483 (2014)Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Pigeon-inspired Optimization Algorithm., , , , and . IDAACS-SWS, page 62-67. IEEE, (2018)