Related references
Note: Only part of the references are listed.A Fast Defogging Image Recognition Algorithm Based on Bilateral Hybrid Filtering
Wei Liang et al.
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2021)
An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
Wei Liang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Deep Reinforcement Learning for Social-Aware Edge Computing and Caching in Urban Informatics
Ke Zhang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment
Wei Liang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Secure Data Storage and Recovery in Industrial Blockchain Network Environments
Wei Liang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Designing collaborative blockchained signature-based intrusion detection in IoT environments
Wenjuan Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things
Wei Liang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things
Ke Zhang et al.
IEEE NETWORK (2019)
A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems
Bowen Hu et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)
Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks
Ke Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
An intrusion detection algorithm for sensor network based on normalized cut spectral clustering
Gaoming Yang et al.
PLOS ONE (2019)
Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics
Ke Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
On-Line Anomaly Detection With High Accuracy
Kun Xie et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2018)
Conceptual alignment deep neural networks
Yinglong Dai et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)
A Deep Learning Approach to Network Intrusion Detection
Nathan Shone et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)
An Adaptive Trajectory Clustering Method Based on Grid and Density in Mobile Pattern Analysis
Yingchi Mao et al.
SENSORS (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
An enhanced smart card based remote user password authentication scheme
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
Xiong Li et al.
MATHEMATICAL AND COMPUTER MODELLING (2013)
Cumulative voting consensus method for partitions with a variable number of clusters
Hanan G. Ayad et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2008)
Maximum likelihood combination of multiple clusterings
Tianming Hu et al.
PATTERN RECOGNITION LETTERS (2006)
Clustering ensembles: Models of consensus and weak partitions
A Topchy et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2005)
Combining multiple clusterings using evidence accumulation
ALN Fred et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2005)
A combination scheme for fuzzy clustering
E Dimitriadou et al.
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE (2002)