Author of the publication

A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection.

, , and . J. Inf. Process. Syst., 18 (1): 146-158 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection., , , and . Secur. Commun. Networks, (2019)PepCyber: P~PEP: a database of human protein-protein interactions mediated by phosphoprotein-binding domains., , , , , , , , , and 2 other author(s). Nucleic Acids Res., 36 (Database-Issue): 679-683 (2008)A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection., , and . J. Inf. Process. Syst., 18 (1): 146-158 (2022)基于云计算平台的仿生优化聚类数据挖掘算法 (Bionic Optimized Clustering Data Mining Algorithm Based on Cloud Computing Platform)., , and . 计算机科学, 46 (11): 247-250 (2019)Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy., , , and . Int. J. Netw. Secur., 14 (5): 270-279 (2012)A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection., , , and . KSII Trans. Internet Inf. Syst., 14 (2): 702-723 (2020)安全迁移支持向量机 (Safety-aware Transfer Learning Support Vector Machine)., , and . 计算机科学, 44 (Z11): 381-384 (2017)An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection., , , , , and . Comput. J., 61 (4): 526-538 (2018)