Author of the publication

Research on intrusion detection method based on SMOTE and DBN-LSSVM.

, , and . Int. J. Inf. Comput. Secur., 18 (3/4): 300-312 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering fuzzy association rules using fuzzy partition methods., , and . Knowl. Based Syst., 16 (3): 137-147 (2003)Generating learning sequences for decision makers through data mining and competence set expansion., , and . IEEE Trans. Syst. Man Cybern. Part B, 32 (5): 679-686 (2002)Developing an XML framework for an electronic document delivery system., and . Electron. Libr., 19 (2): 102-111 (2001)Using RFID technology to develop an intelligent equipment lock management system., , , and . Int. J. Comput. Sci. Eng., 20 (2): 157-165 (2019)An adaptively reversed diffusion dual-drive evolutionary algorithm in dynamic environments for intelligence prediction., , , and . Appl. Soft Comput., (2021)Mechanism analysis of non-inertial particle swarm optimization for Internet of Things in edge computing., , , , and . Eng. Appl. Artif. Intell., (2020)The case study for building a data warehouse in semiconductor manufacturing., , and . Int. J. Comput. Appl. Technol., 24 (4): 195-202 (2005)Application of the multi-agent approach in just-in-time production control system., , and . Int. J. Comput. Appl. Technol., 17 (2): 90-100 (2003)Color disease spot image segmentation algorithm based on chaotic particle swarm optimization and FCM., , , , and . J. Supercomput., 76 (11): 8756-8770 (2020)A study on the critical success factors for corporations embarking on knowledge community-based e-learning., and . Inf. Sci., 177 (2): 570-586 (2007)