Improved CNN method for crop pest identification based on transfer learning Y Liu, X Zhang, Y Gao, T Qu, Y Shi Computational intelligence and neuroscience 2022 (1), 9709648, 2022 | 45 | 2022 |
A negative selection algorithm based on hierarchical clustering of self set and its application in anomaly detection W Chen, XJ Liu, T Li, YQ Shi, XF Zheng, H Zhao International Journal of Computational Intelligence Systems 4 (4), 410-419, 2011 | 25 | 2011 |
An immunity-based time series prediction approach and its application for network security situation Y Shi, R Li, Y Zhang, X Peng Intelligent Service Robotics 8, 1-22, 2015 | 19 | 2015 |
Anomaly Detection for Network Flow Using Immune Network and Density Peak. Y Shi, H Shen Int. J. Netw. Secur. 22 (2), 337-346, 2020 | 16 | 2020 |
Unsupervised anomaly detection for network traffic using artificial immune network Y Shi, H Shen Neural Computing and Applications 34 (15), 13007-13027, 2022 | 14 | 2022 |
Unsupervised anomaly detection for network flow using immune network based k-means clustering Y Shi, X Peng, R Li, Y Zhang Data Science: Third International Conference of Pioneering Computer …, 2017 | 12 | 2017 |
A dynamic quantum group blind signature scheme based on four-particle cluster state RB Lu, JX Zhong, YQ Shi, BL Liao, L Luo, L Lan Quantum Information Processing 22 (3), 157, 2023 | 11 | 2023 |
An immunity-based IOT environment security situation awareness model Y Shi, T Li, R Li, X Peng, P Tang Journal of Computer and Communications 5 (07), 182, 2017 | 11 | 2017 |
Network security situation prediction using artificial immune system and phase space reconstruction YQ Shi, T Li, W Chen, YM Fu Applied Mechanics and Materials 44, 3662-3666, 2011 | 11 | 2011 |
A Danger‐Theory‐Based Immune Network Optimization Algorithm R Zhang, T Li, X Xiao, Y Shi The Scientific World Journal 2013 (1), 810320, 2013 | 10 | 2013 |
Adaptive management with request granularity for dram cache inside nand-based ssds H Lin, J Li, Z Sha, Z Cai, Y Shi, B Gerofi, J Liao IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 9 | 2022 |
A study on the learning early warning prediction based on homework habits: Towards intelligent sustainable evaluation for higher education W Wen, Y Liu, Z Zhu, Y Shi Sustainability 15 (5), 4062, 2023 | 8 | 2023 |
Online homework intelligent platform based on self-regulated learning (srl): essential for sustainable development of online higher education Y Liu, W Wen, Y Gao, X Zhang, T Qu, D Yin, X Peng, Y Shi Sustainability 14 (24), 16904, 2022 | 7 | 2022 |
Survey on APT attack detection in industrial cyber-physical system Y Shi, W Li, Y Zhang, X Deng, D Yin, S Deng 2021 International Conference on Electronic Information Technology and Smart …, 2021 | 7 | 2021 |
Block attribute-aware data reallocation to alleviate read disturb in SSDs M Zhao, J Li, Z Cai, J Liao, Y Shi 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2021 | 7 | 2021 |
Network security situation prediction approach based on clonal selection and scgm (1, 1) c model Y Shi, R Li, X Peng, G Yue 網際網路技術學刊, 2015 | 7 | 2015 |
A network security situation awareness model based on artificial immunity system and cloud model Z Ruirui, L Tao, X Xin, S Yuanquan Computing and Intelligent Systems: International Conference, ICCIC 2011 …, 2011 | 7 | 2011 |
An Immune-Based SCGM (1, 1) c Prediction Model for Network Security Situation⋆ Y Shi, G Xie, Y Zhang, X Peng, B Huang, D Yao, G Yue Journal of Computational Information Systems 9 (11), 4395-4406, 2013 | 6 | 2013 |
Network security situation estimation using artificial immune system and phase space reconstruction [J] S Yuanquan, L Tao, C Wen, F Yanming Applied Mechanics and Materials 12 (10), 44-4, 2011 | 6 | 2011 |
Chaotic time series prediction using immune optimization theory Y Shi, X Liu, T Li, X Peng, W Chen, R Zhang, Y Fu International Journal of Computational Intelligence Systems 3 (Suppl 1), 43-60, 2010 | 6 | 2010 |