Computer Science ›› 2020, Vol. 47 ›› Issue (4): 262-269.doi: 10.11896/jsjkx.190300111
• Computer Network • Previous Articles Next Articles
YANG Li1,2, LI Xin-yu1,2, SHI Huai-feng1,2,3, PAN Cheng-sheng1
CLC Number:
[1]MOORE A W,PAPAGIANNAKI K.Toward the Accurate Identification of Network Applications[C]//Passive and Active Network Measurement,6th International Workshop(PAM 2005).Boston,USA:2005(1):41-54. [2]KARAGIANNIS T,PAPAGIANNAKI K,FALOUTSO M,et al.BLINC:multilevel traffic classification in the dark[C]//Proceedings of the Special Interest Group on Data Communication Conference(SIGCOMM).Philadelphia(USA),2005:221-227. [3]XIONG G,MENG J,CAO Z G,et al.Progress and Prospects of Network Traffic Classification Research[J].Integrated techno-logy,2012,1(1):32-42. [4]PAN W B,CHENG G,GUO X J,et al.Survey and Prospect of Network Encrypted Traffic Identification Research[J].Journal of Communications,2016,37(9):154-167. [5]ZUEV D.Traffic classification using a statistical approach[C]//International Conference on Passive & Active Network Mea-surement.Springer-Verlag,2005.3431:321-324. [6]GEORGE H J,PAT L.Estimating Continuous Distributions in Bayesian Classifiers[C]//UAI’95 Proceedings of the Eleventh conference on Uncertainty in artificial intelligence,2013.11:338-345. [7]MCGREGOR A,HALL M,LORIER P,et al.Flow clustering using machine learning techniques[C]//Antibes Juan-les-Pins(France).PAM2004,2004:32-37. [8]MA Y L,QIAN Z Y,TAO G C,et al.Machine Learning forNetwork Traffic Identification[J].Journal of Beijing University of Posts and Telecommunications,2009,32(1):65-68. [9]DING R,LI W.A hybrid method for service identification ofSSL/TLS encrypted traffic[C]//IEEE International Conference on Computer & Communications.IEEE,2017:250-253. [10]ZHANG L C.Research and Implementation of Satellite Network Routing Protocol[D].Xi’an:Xidian University of Electronic Technology,2017. [11]MIN S Q.Further Discussion on the Conception of Integrated Information Network of Space and Earth Integration in China[C]//Proceedings of the 12th Annual Conference on Satellite Communications.2016:12-30. [12]GU C J,ZHANG S Y,SUN Y F.Qos Adaptive Control Technology for Cognitive Network Based on Service Perception[J].ZTE Technology,2011,17(1):49-52. [13]NIKOUEI S Y,CHEN Y,SONG S,et al.Smart Surveillance as an Edge Network Service:from Harr-Cascade,SVM to a Lightweight CNN[J].2018 IEEE 4th International Conference on Collaboration and Internet Computing,2018:256-265. [14]UCS Satellite database[DB].2018.Https://www.ucsusa.org/nuclear-weapons/space-weapons/satellite-database. [15]HAMIDZADEH J,MOSLEMNEJAD S.Identification of uncertainty and decision boundary for SVM classification training using belief function[J].Applied Intelligence,2018.5:2030-2045. [16]ZHANG H R,HAN Z Z,LI C G.Support Vector Machines[J].Computer Science,2002,29(12):135-137. [17]LI D R,SHEN X,GONG J Y,et al.On Construction of China’s Space Information Network[J].Geomatics and Information Science of Wuhan Univers,2015,40(6):711-715. [18]ZHU H.P2P Traffic Identification Based on Machine Learning[D].Beijing:Journal of Beijing University of Posts and Telecommunications,2010. [19]NETRAPALLI P,NIRANJAN U N,SANGHAVI S,et al.Non-convex Robust PCA[J].Computer Science,2014,10:1107-1115. [20]LIN H M.Analysis of Ten Problems in the Application of Principal Component Analysis[J].Statistics and Decision,2007,16(7):16-18. [21]LI H.Statistical Learning Method [M].Beijing:Tsinghua University Press,2012:195-124. [22]ZHU H L.Research on Traffic Awareness Technology for Service Awareness[D].Beijing:Journal of Beijing University of Posts and Telecommunications,2010. |
[1] | CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300. |
[2] | SONG Yan, HU Rong-hua, GUO Fu-min, YUAN Xin-liang and XIONG Rui-yang. Improved SVM+BP Algorithm for Muscle Force Prediction Based on sEMG [J]. Computer Science, 2020, 47(6A): 75-78. |
[3] | WU Yu-kun,XIAO Jie,Wei William LEE,LOU Ji-lin. Support Vector Machine Model Based on Grey Wolf Optimization Fused Asymptotic [J]. Computer Science, 2020, 47(2): 37-43. |
[4] | ZHOU Yu, REN Qin-chai, NIU Hui-bin. Research on Training Sample Data Selection Methods [J]. Computer Science, 2020, 47(11A): 402-408. |
[5] | XIA Yang-bo, YANG Wen-zhong, ZHANG Zhen-yu, WANG Qing-peng, SHI Yan. Node Position Prediction Method for Mobile Wireless Sensor Networks [J]. Computer Science, 2018, 45(8): 113-118. |
[6] | JIA Xu, SUN Fu-ming, LI Hao-jie, CAO Yu-dong. Vein Recognition Algorithm Based on Supervised NMF with Two Regularization Terms [J]. Computer Science, 2018, 45(8): 283-287. |
[7] | LIU Tao, ZHOU Xian-chun, YAN Xi-jun. LDA Facial Expression Recognition Algorithm Combining Optical Flow Characteristics with Gaussian [J]. Computer Science, 2018, 45(10): 286-290. |
[8] | ZHANG Zhao-hui, LIU Yong-xia and LEI Qian. Image Object Detection Based on SC-AdaBoost [J]. Computer Science, 2015, 42(7): 309-313. |
[9] | HU Wen-jun,WANG Juan,WANG Pei-liang and WANG Shi-tong. Fast Model of Ensembling Linear Support Vector Machines Suitable for Large Datasets [J]. Computer Science, 2014, 41(5): 245-249. |
[10] | ZHANG Fan,DU Bo,ZHANG Liang-pei and ZHANG Le-fei. Band Grouping Based Hyperspectral Image Classification Using Mathematical Morphology and Support Vector Machines [J]. Computer Science, 2014, 41(12): 275-279. |
[11] | SHAO Jie,DU Li-juan and YANG Jing-yu. Applications of XCSG in Multi-robot Reinforcement Learning [J]. Computer Science, 2013, 40(8): 249-251. |
[12] | XIE Jie-zhen,LUO Ting-wei,DAI Jun-wei,WANG Di,GAO Yan and RAN Sheng. Algorithm for Automatic Recognition of Red Tide Algal Images Captured by Flow Cytometry [J]. Computer Science, 2013, 40(7): 293-296. |
[13] | LIU Ying,ZHANG Bai,WANG Ai-lian,SANG Juan and HE Yong-mei. Ensemble Model with Semisupervised SVM for Remote Sensing Land Cover Classification [J]. Computer Science, 2013, 40(7): 206-210. |
[14] | XUE Fei,LU Li-min and WANG Lei. Novel Smooth Regularization Based Semi-supervised SVM Approach and its Application in Credit Evaluation [J]. Computer Science, 2013, 40(10): 239-242. |
[15] | . Research on P2P Traffic Identification Based on K-means Ensemble and SVM [J]. Computer Science, 2012, 39(4): 46-48. |
|