4.6 Article

Microservice combination optimisation based on improved gray wolf algorithm

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Intelligent algorithm for dynamic functional brain network complexity from CN to AD

Chenghui Zhang et al.

Summary: A new intelligent detecting algorithm for the complexity of Alzheimer's disease (AD) dynamic network was proposed based on visibility graph, revealing a shift of dynamic complexity in brain regions from frontal to temporal and occipital lobes, which correlated significantly with clinical symptoms. The small-world topological properties of the dynamic complexity network also exhibited significant differences between cognitively normal (CN) individuals and AD patients.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Bin similarity-based domain adaptation for fine-grained image classification

Tianyu Han et al.

Summary: Fine-grained classification tasks are challenging due to the scarcity of data sets. This study utilized domain adaptation to transfer knowledge from large, labeled data sets to fine-grained target data sets. The implementation of the bin similarity algorithm improved the classification performance compared to existing methods, making it a valuable tool for domain adaptation.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Motif-based embedding label propagation algorithm for community detection

Chunying Li et al.

Summary: The study introduces a novel community detection method - MELPA, which effectively reveals the community structure in complex networks through motif-based embedding label propagation algorithm. By integrating higher-order topology with lower-order connectivity features, reconstructing the network topology, and designing a new label update rule to overcome the randomness of label selection.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

A group key agreement protocol for intelligent internet of things system

Qikun Zhang et al.

Summary: The application of intelligent computing in Internet of Things (IoTs) enhances the intelligence and efficiency of various IoTs systems, and secure communication among intelligent terminals can be ensured through group key agreement (GKA).

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Information Systems

PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage

Hongyang Yan et al.

Summary: The study proposes a privacy-preserving collaborative machine learning scheme to prevent information leakage and enhance efficiency. By utilizing methods such as network transformation, random uploading, and network pruning, it effectively protects model parameters, reduces information inference, and accelerates training.

INFORMATION SCIENCES (2021)

Article Computer Science, Artificial Intelligence

CSRT rumor spreading model based on complex network

Shan Ai et al.

Summary: This paper explores the rules and impacts of rumor spreading, proposing an improved propagation model and identifying a correlation between anxiety and the degree of rumor spread. The study also introduces a new network topology model for sharing social networks, addressing issues present in traditional models.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

ImpSuic: A quality updating rule in mixing coins with maximum utilities

Xinying Yu et al.

Summary: The mixing coins strategy can achieve user anonymity and protect their privacy. However, the incomplete blacklist information may be exploited by illegal criminals. The ImpSuic strategy proposes a new quality updating rule to address these issues and preserve users' privacy.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Camdar-adv: Generating adversarial patches on 3D object

Chang Chen et al.

Summary: Research shows that deep neural network models are vulnerable to adversarial examples, resulting in incorrect outputs. Current autonomous driving platform research focuses on attacking single sensors, while Camdar-adv introduces a method for generating multi-sensor attacks.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Adversarial examples: attacks and defenses in the physical world

Huali Ren et al.

Summary: Deep learning technology is vulnerable to adversarial examples, which bring serious security risks to systems. This paper provides a comprehensive overview of adversarial attacks and defenses in the real physical world, analyzing challenges faced by applications and summarizing works on generating adversarial examples and defense strategies in various tasks. Based on this, potential research directions for adversarial examples in the physical world are proposed.

INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2021)

Article Computer Science, Software Engineering

Developing Self-Adaptive Microservice Systems: Challenges and Directions

Nabor C. Mendonca et al.

Summary: This article discusses the key challenges of developing microservice applications as self-adaptive systems, using an intelligent video-surveillance application as an example, and proposes potential new directions for addressing these challenges by leveraging existing microservice practices and technologies.

IEEE SOFTWARE (2021)

Article Computer Science, Artificial Intelligence

Enhancing intrusion detection with feature selection and neural network

Chunhui Wu et al.

Summary: This study investigates feature selection methods and introduces an ensemble of Neural Networks and Random Forest to enhance intrusion detection performance. The experimental results show that compared to similar approaches, this method can better identify important and relevant features.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Information Systems

A QoS-Aware Service Composition Mechanism in the Internet of Things Using a Hidden-Markov-Model-Based Optimization Algorithm

Seyedsalar Sefati et al.

Summary: The Internet of Things (IoT) presents various service composition issues related to QoS parameters, which are typically addressed using metaheuristic methods like HMM and ACO. This research proposes an effective strategy for enhancing QoS in IoT by training HMM to predict QoS and utilizing ACO for QoS estimation. The results demonstrate the efficacy of the approach in improving availability, response time, cost, reliability, and energy consumption compared to previous methods.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

MHAT: An efficient model-heterogenous aggregation training scheme for federated learning

Li Hu et al.

Summary: The study proposed a novel model-heterogenous aggregation training federated learning scheme MHAT, which uses knowledge distillation technique to achieve information aggregation, enabling clients to effectively collaborate in training a global model without fixing a unified model architecture and reducing the required computing resources.

INFORMATION SCIENCES (2021)

Article Computer Science, Artificial Intelligence

Hybrid sequence-based Android malware detection using natural language processing

Nan Zhang et al.

Summary: Researchers studied Android malware detection methods and proposed a sequence-based hybrid detection method. By serializing static opcode and dynamic system call sequences, a CNN-BiLSTM-Attention classifier was built. Experimental results demonstrated the effectiveness and flexibility of this method across various experimental settings.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Analyzing host security using D-S evidence theory and multisource information fusion

Yuanzhang Li et al.

Summary: The paper proposes a host security analysis method based on the D-S evidence theory, utilizing multiple models for multisource information fusion, which effectively enhances the host's security protection.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Review Computer Science, Information Systems

A review on genetic algorithm: past, present, and future

Sourabh Katoch et al.

Summary: This paper discusses recent advances in genetic algorithms, analyzing selected algorithms of interest in the research community. It helps new and demanding researchers gain a broader understanding of genetic algorithms. The review covers well-known algorithms, genetic operators, research domains, and future research directions in genetic algorithms.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

An enhanced multi-objective grey wolf optimizer for service composition in cloud manufacturing

Yefeng Yang et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

Adversarial attacks on deep-learning-based radar range profile target recognition

Teng Huang et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Hardware & Architecture

Adversarial attacks on deep-learning-based SAR image target recognition

Teng Huang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Optimal mixed block withholding attacks based on reinforcement learning

Yilei Wang et al.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

Secure video retrieval using image query on an untrusted cloud

Hongyang Yan et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Artificial Intelligence

A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm

Afshin Naseri et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

A hierarchical group key agreement protocol using orientable attributes for cloud computing

Qikun Zhang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

The security of machine learning in an adversarial setting: A survey

Xianmin Wang et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Automation & Control Systems

An Improved Grey Wolf Optimizer Algorithm for Energy-Aware Service Composition in Cloud Manufacturing

Yefeng Yang et al.

INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY (2019)

Review Computer Science, Artificial Intelligence

Particle Swarm Optimization: A Survey of Historical and Recent Developments with Hybridization Perspectives

Saptarshi Sengupta et al.

MACHINE LEARNING AND KNOWLEDGE EXTRACTION (2019)

Article Computer Science, Information Systems

Multi-Colony Ant Colony Optimization Based on Generalized Jaccard Similarity Recommendation Strategy

Dehui Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A payload-dependent packet rearranging covert channel for mobile VoIP traffic

Chen Liang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Interdisciplinary Applications

Grey Wolf Optimizer

Seyedali Mirjalili et al.

ADVANCES IN ENGINEERING SOFTWARE (2014)

Article Computer Science, Artificial Intelligence

Crisscross optimization algorithm and its application

An-bo Meng et al.

KNOWLEDGE-BASED SYSTEMS (2014)

Article Computer Science, Information Systems

A survey on optimization metaheuristics

Ilhern Boussaid et al.

INFORMATION SCIENCES (2013)