[1] |
WU Xiaodong, LIU Jinghao, JIN Jie, MAO Siping.
DNN Intrusion Detection Model Based on DT and PCA
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(8): 1450-1458.
|
[2] |
YANG Yong, MENG Xiangru, KANG Qiaoyan, HAN Xiaoyang.
Virtual Network Function Migration Method Based on Topology and Resource Awareness
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(11): 2161-2170.
|
[3] |
YANG Jie, TANG Yachun, TAN Daojun, LIU Xiaobing.
Intrusion Detection Method of Multi-channel Autoencoder Deep Learning
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(12): 2050-2060.
|
[4] |
SHEN Zhijun, TAO Donghua, GAO Jing.
Multichannel-Feedback-Based Two-Stage Switch Architecture
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1516-1523.
|
[5] |
CHEN Hong, CHEN Jianhu, XIAO Chenglong, WAN Guangxue, XIAO Zhenjiu.
Intrusion Detection Method of Multiple Classifiers Under Deep Learning Model
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(7): 1123-1133.
|
[6] |
JIAO Peiyan, ZHANG Chuangchuang, WANG Xingwei, HUANG Min.
Mechanism for Determination and Partition of SDN Control Domain
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(12): 2053-2060.
|
[7] |
WANG Yi, FENG Xiaonian, QIAN Tieyun, ZHU Hui3, ZHOU Jing.
CNN and LSTM Deep Network Based Intrusion Detection for Malicious Users
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(4): 575-585.
|
[8] |
WANG Tao, HU Shuanglin.
High Performance Computing in Materials Science
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(2): 185-193.
|
[9] |
LI Weidong, LICHEN Junran, LI Jianping.
Load Balancing Problem with Hierarchical Constraints in lp Norm
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(8): 1184-1190.
|
[10] |
PENG Jianhua, LI Chenming, QIU Junlin, LI Xiaofang, XU Lizhong.
Real-Time Big Data Processing Model Based on Receiving and Processing Separation
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(8): 906-913.
|
[11] |
HUO Jiantong, LI Yunchun, YANG Xiumei.
Feasibility Research on Distributed Mandatory Access Control for HPC Cluster
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(5): 543-549.
|
[12] |
ZHOU Huanyun1,2, WANG Wei1,3, ZHANG Wenbo1.
Self-adaptive Adjusting Approach for Cluster in Cloud Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(4): 347-355.
|
[13] |
TIAN Xinguang1+, CHENG Xueqi1, CHEN Xiaojuan2, DUAN Miyi1, XU Hongbo1.
Masquerade Detection Towards Network Users on Unix and Linux Platforms*
[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(6): 500-510.
|