4.8 Article

Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A Fast Defogging Image Recognition Algorithm Based on Bilateral Hybrid Filtering

Wei Liang et al.

Summary: This paper proposes a fast defogging image recognition algorithm based on bilateral hybrid filtering. Experimental results show promising defogging effect and speed, with the image recognition rate reaching 98.8% after defogging.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2021)

Article Automation & Control Systems

An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Deep Reinforcement Learning for Social-Aware Edge Computing and Caching in Urban Informatics

Ke Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment

Wei Liang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

Secure Data Storage and Recovery in Industrial Blockchain Network Environments

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Wenjuan Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Automation & Control Systems

A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things

Ke Zhang et al.

IEEE NETWORK (2019)

Article Automation & Control Systems

A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems

Bowen Hu et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Article Computer Science, Information Systems

Artificial Intelligence Inspired Transmission Scheduling in Cognitive Vehicular Communications and Networks

Ke Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics

Ke Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

On-Line Anomaly Detection With High Accuracy

Kun Xie et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2018)

Article Computer Science, Artificial Intelligence

Conceptual alignment deep neural networks

Yinglong Dai et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

A Deep Learning Approach to Network Intrusion Detection

Nathan Shone et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Hardware & Architecture

An enhanced smart card based remote user password authentication scheme

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Interdisciplinary Applications

A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments

Xiong Li et al.

MATHEMATICAL AND COMPUTER MODELLING (2013)

Article Computer Science, Artificial Intelligence

Cumulative voting consensus method for partitions with a variable number of clusters

Hanan G. Ayad et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2008)

Article Computer Science, Artificial Intelligence

Maximum likelihood combination of multiple clusterings

Tianming Hu et al.

PATTERN RECOGNITION LETTERS (2006)

Article Computer Science, Artificial Intelligence

Clustering ensembles: Models of consensus and weak partitions

A Topchy et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2005)

Article Computer Science, Artificial Intelligence

Combining multiple clusterings using evidence accumulation

ALN Fred et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2005)

Article Computer Science, Artificial Intelligence

A combination scheme for fuzzy clustering

E Dimitriadou et al.

INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE (2002)