Folgen
Yuanquan Shi
Yuanquan Shi
Huaihua University
Bestätigte E-Mail-Adresse bei adelaide.edu.au - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Improved CNN method for crop pest identification based on transfer learning
Y Liu, X Zhang, Y Gao, T Qu, Y Shi
Computational intelligence and neuroscience 2022 (1), 9709648, 2022
452022
A negative selection algorithm based on hierarchical clustering of self set and its application in anomaly detection
W Chen, XJ Liu, T Li, YQ Shi, XF Zheng, H Zhao
International Journal of Computational Intelligence Systems 4 (4), 410-419, 2011
252011
An immunity-based time series prediction approach and its application for network security situation
Y Shi, R Li, Y Zhang, X Peng
Intelligent Service Robotics 8, 1-22, 2015
192015
Anomaly Detection for Network Flow Using Immune Network and Density Peak.
Y Shi, H Shen
Int. J. Netw. Secur. 22 (2), 337-346, 2020
162020
Unsupervised anomaly detection for network traffic using artificial immune network
Y Shi, H Shen
Neural Computing and Applications 34 (15), 13007-13027, 2022
142022
Unsupervised anomaly detection for network flow using immune network based k-means clustering
Y Shi, X Peng, R Li, Y Zhang
Data Science: Third International Conference of Pioneering Computer …, 2017
122017
A dynamic quantum group blind signature scheme based on four-particle cluster state
RB Lu, JX Zhong, YQ Shi, BL Liao, L Luo, L Lan
Quantum Information Processing 22 (3), 157, 2023
112023
An immunity-based IOT environment security situation awareness model
Y Shi, T Li, R Li, X Peng, P Tang
Journal of Computer and Communications 5 (07), 182, 2017
112017
Network security situation prediction using artificial immune system and phase space reconstruction
YQ Shi, T Li, W Chen, YM Fu
Applied Mechanics and Materials 44, 3662-3666, 2011
112011
A Danger‐Theory‐Based Immune Network Optimization Algorithm
R Zhang, T Li, X Xiao, Y Shi
The Scientific World Journal 2013 (1), 810320, 2013
102013
Adaptive management with request granularity for dram cache inside nand-based ssds
H Lin, J Li, Z Sha, Z Cai, Y Shi, B Gerofi, J Liao
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022
92022
A study on the learning early warning prediction based on homework habits: Towards intelligent sustainable evaluation for higher education
W Wen, Y Liu, Z Zhu, Y Shi
Sustainability 15 (5), 4062, 2023
82023
Online homework intelligent platform based on self-regulated learning (srl): essential for sustainable development of online higher education
Y Liu, W Wen, Y Gao, X Zhang, T Qu, D Yin, X Peng, Y Shi
Sustainability 14 (24), 16904, 2022
72022
Survey on APT attack detection in industrial cyber-physical system
Y Shi, W Li, Y Zhang, X Deng, D Yin, S Deng
2021 International Conference on Electronic Information Technology and Smart …, 2021
72021
Block attribute-aware data reallocation to alleviate read disturb in SSDs
M Zhao, J Li, Z Cai, J Liao, Y Shi
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2021
72021
Network security situation prediction approach based on clonal selection and scgm (1, 1) c model
Y Shi, R Li, X Peng, G Yue
網際網路技術學刊, 2015
72015
A network security situation awareness model based on artificial immunity system and cloud model
Z Ruirui, L Tao, X Xin, S Yuanquan
Computing and Intelligent Systems: International Conference, ICCIC 2011 …, 2011
72011
An Immune-Based SCGM (1, 1) c Prediction Model for Network Security Situation⋆
Y Shi, G Xie, Y Zhang, X Peng, B Huang, D Yao, G Yue
Journal of Computational Information Systems 9 (11), 4395-4406, 2013
62013
Network security situation estimation using artificial immune system and phase space reconstruction [J]
S Yuanquan, L Tao, C Wen, F Yanming
Applied Mechanics and Materials 12 (10), 44-4, 2011
62011
Chaotic time series prediction using immune optimization theory
Y Shi, X Liu, T Li, X Peng, W Chen, R Zhang, Y Fu
International Journal of Computational Intelligence Systems 3 (Suppl 1), 43-60, 2010
62010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20