Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Artificial intelligence in the cyber domain: Offense and defense
Artificial intelligence techniques have grown rapidly in recent years, and their applications in
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …
A systematic literature review on swarm intelligence based intrusion detection system: past, present and future
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve
using traditional mathematical methodologies by using a collective behavior of a …
using traditional mathematical methodologies by using a collective behavior of a …
SPA-IDS: An intelligent intrusion detection system based on vertical mode decomposition and iterative feature selection in computer networks
Ensuring the security of critical infrastructures and information systems has always been a
challenging problem. Intrusion Detection Systems (IDS) have become an indispensable …
challenging problem. Intrusion Detection Systems (IDS) have become an indispensable …
Performance of multiple models for estimating rodent activity intensity in alpine grassland using remote sensing
G Dong, W **an, H Shao, Q Shao, J Qi - Remote Sensing, 2023 - mdpi.com
Rodents are a vital part of the natural succession chain of the alpine grassland ecosystem,
and rodent activities have an important impact on alpine grassland ecology. Moderate …
and rodent activities have an important impact on alpine grassland ecology. Moderate …
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm
In recent years, the widespread use of the Internet has created many issues, especially in
the area of cybersecurity. It is critical to detect intrusions in network traffic, and researchers …
the area of cybersecurity. It is critical to detect intrusions in network traffic, and researchers …
An effective lightweight intrusion detection system with blockchain to mitigate attacks in SDN/NFV enabled cloud
Software defined network (SDN) and network function virtualization (NFV) are the two key
technologies that support a large scale 5G environment composed of bunches of users. In …
technologies that support a large scale 5G environment composed of bunches of users. In …
Artificial Bee Colony Optimization Techniques' Utilization for Intrusion Detection Systems' Analysis
E Tokgoz - 2025 IEEE 4th International Conference on AI in …, 2025 - ieeexplore.ieee.org
A variety of nonlinear optimization techniques have been used for measuring effectiveness
of Intrusion Detection Systems (IDS). The variability of these optimization techniques …
of Intrusion Detection Systems (IDS). The variability of these optimization techniques …
[HTML][HTML] A Two-Stage Feature Selection Approach Based on Artificial Bee Colony and Adaptive LASSO in High-Dimensional Data
High-dimensional datasets, where the number of features far exceeds the number of
observations, present significant challenges in feature selection and model performance …
observations, present significant challenges in feature selection and model performance …
[PDF][PDF] Using a hybrid algorithm with intrusion detection system based on hierarchical deep learning for smart meter communication network
A Alghazali, Z Hanoosh - Webology, 2022 - webology.org
Smart meters are central for renewable electricity generation and distributed integration.
Smart metering concerns some intelligent metering devices use at the location of customer …
Smart metering concerns some intelligent metering devices use at the location of customer …
Integrating Artificial Bee Colony Algorithms for Deep Learning Model Optimization: A Comprehensive Review
This chapter explores the innovative fusion of Artificial Bee Colony (ABC) algorithms with
deep learning techniques, providing a comprehensive analysis of the synergistic …
deep learning techniques, providing a comprehensive analysis of the synergistic …