计算机科学 ›› 2020, Vol. 47 ›› Issue (7): 141-153.doi: 10.11896/jsjkx.200300130

• 人工智能 • 上一篇    下一篇

基于深度学习的信息级联预测方法综述

张志扬, 张凤荔, 谭琪, 王瑞锦   

  1. 电子科技大学信息与软件工程学院 成都 610054
  • 收稿日期:2020-03-23 出版日期:2020-07-15 发布日期:2020-07-16
  • 通讯作者: 张凤荔(fzhang@uestc.edu.cn)
  • 作者简介:13980044734@163.com
  • 基金资助:
    国家自然科学基金(61802033,61472064,61602096);四川省科技计划(2018GZ0087,2019YJ0543);四川省区域创新合作项目(2020YFQ0018);博士后基金项目(2018M643453);广东省国家重点实验室项目(2017B030314131);网络与数据安全四川省重点实验室开放课题(NDSMS201606)

Review of Information Cascade Prediction Methods Based on Deep Learning

ZHANG Zhi-yang, ZHANG Feng-li, TAN Qi, WANG Rui-jin   

  1. School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
  • Received:2020-03-23 Online:2020-07-15 Published:2020-07-16
  • About author:ZHANG Zhi-yang,born in 1997,postgraduate,is a member of China Computer Federation.His main research interests include machine learning,data mining and cascade prediction.
    ZHANG Feng-li,born in 1963,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.Her main research interests include network security and network engineering,cloud computing and big data and machine learning.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(61802033,61472064,61602096),Sichuan Science and Technology Program (2018GZ0087,2019YJ0543),Sichuan Regional Innovation Cooperation Project(2020YFQ0018),Chinese Postdoctoral Science Foundation(2018M643453), Guangdong Provincial Key Laboratory Project(2017B030314131) and Network and Data Security Key Laboratory of Sichuan Province Open Issue(NDSMS201606)

摘要: 在线社交媒体极大地促进了信息的产生和传递,加速了海量信息之间的传播与交互,使预测信息级联的重要性逐渐突显。近年来,深度学习已经被广泛用于信息级联预测(Information Cascade Prediction)领域。文中主要对基于深度学习的信息级联预测方法的研究现状与经典算法进行分类、梳理与总结。根据信息级联特征刻画的侧重点不同,将基于深度学习的信息级联预测方法分为时序信息级联预测方法与拓扑信息级联预测方法,并进一步将时序信息级联预测方法分为基于随机游走(Random Walk)的方法与基于扩散路径的方法,将拓扑信息级联预测方法分为基于全局拓扑结构的方法与基于邻域聚合的方法;并对每类方法进行详细的原理阐述与优缺点介绍,介绍了信息级联预测领域常用的数据集与评价指标,在宏观与微观两种信息级联预测场景下对基于深度学习的信息级联预测算法进行实验对比,并讨论了一些信息级联预测算法中常用的算法实现细节。最后,总结了该领域未来可能的研究方向与发展趋势。

关键词: 级联增量预测, 节点预测, 流行度预测, 深度学习, 信息级联预测, 在线社交媒体

Abstract: Online social media greatly promotes the generation and transmission of information,exacerbates the communication and interaction between massive amounts of information,and highlights the importance of predicting information cascades.In recent years,deep learning has been widely used in the field of information cascade prediction.This paper mainly classifies,sorts,and summarizes the current research status of deep learning-based information cascade prediction methods and classic algorithms.According to the different emphasis of information cascade feature characterization,the information cascade prediction method based on deep learning is divided into time series information cascade prediction method and topology information cascade prediction method.The time series information cascade prediction method is further divided into methods based on random walks and methods based on diffusion paths,and the topology information cascade prediction method is divided into methods based on global topological structure and methods based on neighborhood aggregation.This paper details the principles and advantages and disadvantages of each type of method,and introduces the data sets and evaluation indicators commonly used in the field of information cascade prediction,and compares the information cascade prediction algorithms based on deep learning in the macro and micro information cascade prediction scenarios,and discusses some technical details commonly used in information cascade prediction algorithms.Finally,this paper summarizes the field possible future research directions and development trends.

Key words: Cascade size prediction, Deep learning, Information cascade prediction, Node prediction, Online social media, Popularity prediction

中图分类号: 

  • TP183
[1]YANG J,COUNTS S.Predicting the speed,scale,and range of information diffusion in twitter[C]//Fourth International AAAI Conference on Weblogs and Social Media.2010.
[2]GRUHL D,GUHA R,LIBEN-NOWELL D,et al.Information diffusion through blogspace[C]//Proceedings of the 13th international conference on World Wide Web.ACM,2004:491-501.
[3]LESKOVEC J,MCGLOHON M,FALOUTSOS C,et al.Patterns of cascading behavior in large blog graphs[C]//Procee-dings of the 2007 SIAM international conference on data mining.Society for Industrial and Applied Mathematics,2007:551-556.
[4]GOLUB B,JACKSON M O.Using selection bias to explain the observed structure of internet diffusions[J].Proceedings of the National Academy of Sciences,2010,107(24):10833-10836.
[5]LIBEN-NOWELL D,KLEINBERG J.Tracing information flow on a global scale using Internet chain-letter data[J].Proceedings of the National Academy of Sciences of the United States of America,2008,105(12):4633-4638.
[6]LESKOVEC J,ADAMIC L A,HUBERMAN B A.The dyna-mics of viral marketing[J].ACM Transactions on the Web (TWEB),2007,1(1):5.
[7]DOW P A,ADAMIC L A,FRIGGERI A.The anatomy of large facebook cascades[C]//Seventh international AAAI conference on weblogs and social media.2013.
[8]KUMAR R,MAHDIAN M,MCGLOHON M.Dynamics of conversations[C]//Proceedings of the 16th ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining.ACM,2010:553-562.
[9]QIU J,TANG J,MA H,et al.Deepinf:Social influence prediction with deep learning[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.ACM,2018:2110-2119.
[10]GE Y,CHEN S C.Graph Convolutional Network for Recom-mender Systems[J/OL].[2020-02-20].http://www.jos.org.cn/1000-9825/5928.htm.
[11]KUPAVSKII A,OSTROUMOVA L,UMNOV A,et al.Prediction of retweet cascade size over time[C]//Proceedings of the 21st ACMInternational Conference on Information and Know-ledge Management.ACM,2012:2335-2338.
[12]MA Z,SUN A,CONG G.On predicting the popularity of newly emerging hashtags in Twitter[J].Journal of the American So-ciety for Information Science and Technology,2013,64(7):1399-1410.
[13]PETROVIC S,OSBORNE M,LAVRENKO V.Rt to win! predicting message propagation in twitter[C]//Fifth International AAAI Conference on Weblogs and Social Media.2011.
[14]SZABO G,HUBERMAN B A.Predicting the popularity of online content[J].Communications of the ACM,2010,53(8):80-88.
[15]GUO R,SHAKARIAN P.A comparison of methods for cascade prediction[C]//Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.IEEE Press,2016:591-598.
[16]CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted?[C]//Proceedings of the 23rdInternational Conference on World Wide Web.ACM,2014:925-936.
[17]WENG L,MENCZER F,AHN Y Y.Virality prediction andcommunity structure in social networks[J].Scientific reports,2013,3:2522.
[18]TSUR O,RAPPOPORT A.What's in a hashtag?:content based prediction of the spread of ideas in microblogging communities[C]//Proceedings of the fifth ACMInternational Conference on Web Search and Data Mining.ACM,2012:643-652.
[19]BAKSHY E,HOFMAN J M,MASON W A,et al.Everyone’s an influencer:quantifying influence on twitter[C]//Proceedings of the4th ACM International Conference on Web Search and Data Mining.ACM,2011:65-74.
[20]MARTIN T,HOFMAN J M,SHARMA A,et al.Exploring limits to prediction in complex social systems[C]//Proceedings of the 25th International Conference on World Wide Web.International World Wide Web Conferences Steering Committee,2016:683-694.
[21]BAO P,SHEN H W,JIN X,et al.Modeling and predicting po-pularity dynamics of microblogs using self-excited hawkes processes[C]//Proceedings of the 24th International Conference on World Wide Web.ACM,2015:9-10.
[22]ZHAO Q,ERDOGDU M A,HE H Y,et al.Seismic:A self-exciting point process model for predicting tweet popularity[C]//Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2015:1513-1522.
[23]CRANE R,SORNETTE D.Robust dynamic classes revealed by measuring the response function of a social system[J].Proceedings of the National Academy of Sciences of the United States of America,2008,105(41):15649-15653.
[24]RIZOIU M A,XIE L,SANNER S,et al.Expecting to be hip:Hawkes intensity processes for social media popularity[C]//Proceedings of the 26th International Conference on World Wide Web.International World Wide Web Conferences Steering Committee,2017:735-744.
[25]XIAO S,YAN J,YANG X,et al.Modeling the intensity function of point process via recurrent neural networks[C]//Thirty-First AAAI Conference on Artificial Intelligence.2017.
[26]WANG Y,SHEN H,LIU S,et al.Cascade Dynamics Modeling with Attention-based Recurrent Neural Network[C]//IJCAI.2017:2985-2991.
[27]SHEN H,WANG D,SONG C,et al.Modeling and predictingpopularity dynamics via reinforced poisson processes[C]//Twenty-eighth AAAIConference on Artificial Intelligence.2014.
[28]GAO J,SHEN H,LIU S,et al.Modeling and predicting retweeting dynamics via a mixture process[C]//Proceedings of the 25th International Conference Companion on World Wide Web.International World Wide Web Conferences Steering Committee,2016:33-34.
[29]GAO S,MA J,CHEN Z.Modeling and predicting retweeting dynamics on microblogging platforms[C]//Proceedings of the Eighth ACM International Conference on Web Search and Data Mining.ACM,2015:107-116.
[30]GOMEZ-RODRIGUEZ M,LESKOVEC J,SCHÖLKOPF B.Modeling information propagation with survival theory[C]//International Conference on Machine Learning.2013:666-674.
[31]KEMPE D,KLEINBERG J,TARDOS É.Maximizing the spread of influence through a social network[C]//Proceedings of the9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2003:137-146.
[32]WANG Y,SHEN H W,LIU S,et al.Learning user-specific latent influence and susceptibility from information cascades[J].arXiv preprint arXiv:1310.3911,2013.
[33]LI C,MA J,GUO X,et al.Deepcas:An end-to-end predictor of information cascades[C]//Proceedings of the 26thInternational Conference on World Wide Web.International World Wide Web Conferences Steering Committee,2017:577-586.
[34]LIN J,ZHANG L,HE M,et al.Multi-path relationship pre-served social network embedding[J].IEEE Access,2019,7:26507-26518.
[35]CAO Q,SHEN H,CEN K,et al.Deephawkes:Bridging the gap between prediction and understanding of information cascades[C]//Proceedings of the 2017 ACM on Conference on Information and Knowledge Management.ACM,2017:1149-1158.
[36]WANG S J,ZHOU L H,KONG B,et al.LDA-DeepHawkesmodel for predicting information cascade[J/OL].Journal of Frontiers of Computer Science and Technology:1-21.[2019-10-14].http://kns.cnki.net/kcms/detail/11.5602.TP.20190628.1726.006.html.
[37]ISLAM M R,MUTHIAH S,ADHIKARI B,et al.DeepDiffuse:Predicting the'Who'and'When'in Cascades[C]//2018 IEEE International Conference on Data Mining (ICDM).IEEE,2018:1055-1060.
[38]PEROZZI B,AL-RFOU R,SKIENA S.Deepwalk:Online learning of social representations[C]//Proceedings of the 20th ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining.ACM,2014:701-710.
[39]RAMAGE D,DUMAIS S,LIEBLING D.Characterizing microblogs with topic models[C]//4th International AAAI Conference on Weblogs and Social Media.2010.
[40]ZHANG C Y,SUN J L,DING Y Q.Topic mining for microblog based on MB-LDA model[J].Journal of Computer Research and Development,2011,48(10):1795-1802.
[41]KANG J H,LERMAN K,GETOOR L.LA-LDA:a limited attention topic model for social recommendation[C]//Internatio-nal Conference on Social Computing,Behavioral-Cultural Mode-ling,and Prediction.Heidelberg:Springer 2013:211-220.
[42]LIU Y,WANG J,JIANG Y.PT-LDA:A latent variable model to predict personality traits of social network users[J].Neurocomputing,2016,210:155-163.
[43]NI L P,LIU X J,MA C Y.Topic Evolution Analysis Based on LDA Model and AP Clustering[J].Computer Technology and Development,2016,26(12):6-11.
[44]CHEN G,KONG Q,XU N,et al.NPP:A neural popularity prediction model for social media content[J].Neurocomputing,2019,333:221-230.
[45]WU Z,PAN S,CHEN F,et al.A comprehensive survey ongraph neural networks[J].arXiv:1901.00596,2019.
[46]BENGIO Y,DUCHARME R,VINCENT P,et al.A neuralprobabilistic language model[J].Journal of machine learning research,2003,3(Feb):1137-1155.
[47]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenetclassification with deep convolutional neural networks[C]//Advances inNeural Information Processing Systems.2012:1097-1105.
[48]NIEPERT M,AHMED M,KUTZKOV K.Learning convolu-tional neural networks for graphs[C]//InternationalConference on Machine Learning.2016:2014-2023.
[49]DEFFERRARD M,BRESSON X,VANDERGHEYNST P.Convolutional neural networks on graphs with fast localized spectral filtering[C]//Advances inNeural Information Processing Systems.2016:3844-3852.
[50]LI C,GUO X,MEI Q.Deepgraph:Graph structure predicts network growth[J].arXiv preprint arXiv:1610.06251,2016.
[51]WANG Z,CHEN C,LI W.A Sequential Neural InformationDiffusion Model with Structure Attention[C]//Proceedings of the 27th ACM International Conference on Information and Knowledge Management.ACM,2018:1795-1798.
[52]WANG J,ZHENG V W,LIU Z,et al.Topological recurrentneural network for diffusion prediction[C]//2017 IEEE International Conference on Data Mining (ICDM).IEEE,2017:475-484.
[53]CHEN X,ZHOU F,ZHANG K,et al.Information DiffusionPrediction via Recurrent Cascades Convolution[C]//2019 IEEE 35th International Conference on Data Engineering (ICDE).IEEE,2019:770-781.
[54]CHEN X,ZHANG K,ZHOU F,et al.Information CascadesModeling via Deep Multi-Task Learning[C]//Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval.ACM,2019:885-888.
[55]YANG C,TANG J,SUN M,et al.Multi-scale information diffusion prediction with reinforced recurrent networks[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence.AAAI Press,2019:4033-4039.
[56]SHUAI B,ZUO Z,WANG B,et al.Dag-recurrent neural net-works for scene labeling[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:3620-3629.
[57]BALDI P,POLLASTRI G.The principled design of large-scale recursive neural network architectures--dag-rnns and the protein structure prediction problem[J].Journal of Machine Learning Research,2003,4(Sep):575-602.
[58]BIANCHINI M,MAGGINI M,SARTI L,et al.Recursive neural networks for processing graphs with labelled edges:Theory and applications[J].Neural Networks,2005,18(8):1040-1050.
[59]LEI T,ZHANG Y,ARTZI Y.Training rnns as fast as cnns[J].arXiv:1709.02755,2017.
[60]HAMILTON W,YING Z,LESKOVEC J.Inductive representation learning on large graphs[C]//Advances in Neural Information Processing Systems.2017:1024-1034.
[61]KIPF T N,WELLING M.Semi-supervised classification withgraph convolutional networks[J].arXiv:1609.02907,2016.
[62]VELIKOVI P,CUCURULL G,CASANOVA A,et al.Graph attention networks[J].arXiv preprint arXiv:1710.10903,2017.
[63]LI Y,ZHANG Z L.Digraph laplacian and the degree of asymmetry[J].Internet Mathematics,2012,8(4):381-401.
[64]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Advances in Neural Information Processing Systems.2017:5998-6008.
[65]SUTTON R S,MCALLESTER D A,SINGH S P,et al.Policy gradient methods for reinforcement learning with function approximation[C]//Advances in Neural Information Processing Systems.2000:1057-1063.
[66]HODAS N O,LERMAN K.The simple rules of social contagion[J].Scientific Reports,2014,4:4343.
[67]GEHRKE J,GINSPARG P,KLEINBERG J.Overview of the2003 KDD Cup[J].Acm SIGKDD Explorations Newsletter,2003,5(2):149-151.
[68]LESKOVEC J,BACKSTROM L,KLEINBERG J.Meme-tracking and the dynamics of the news cycle[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2009:497-506.
[69]HOGG T,LERMAN K.Social dynamics of digg[J].EPJ Data Science,2012,1(1):5.
[70]TANG L,LIU H.Relational learning via latent social dimensions[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:817-826.
[71]BUCKLEY C,VOORHEES E M.Retrieval evaluation with incomplete information[C]//Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval.ACM,2004:25-32.
[72]WANG Z,LI W.Hierarchical diffusion attention network[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence.AAAI Press,2019:3828-3834.
[73]SUN S.Multi-view Laplacian support vector machines[C]//International Conference on Advanced Data Mining and Applications.Heidelberg:Springer,2011:209-222.
[74]SUN S,SHAWE-TAYLOR J,MAO L.PAC-Bayes analysis of multi-view learning[J].Information Fusion,2017,35:117-131.
[75]JING P,SU Y,NIE L,et al.Low-rank multi-view embedding learning for micro-video popularity prediction[J].IEEE Transactions on Knowledge and Data Engineering,2017,30(8):1519-1532.
[76]GONG W H,CHEN Y Q,PEI X B,et al.Community detection combined with multi-dimensional relationships in location-based social networks[J/OL].Journal of Software:1-16.[2019-10-08].http://jos.org.cn/1000-9825/5269.htm.
[77]BODIN E,MALIK I,EK C H,et al.Nonparametric inference for auto-encoding variational Bayes[J].arXiv:1712.06536,2017.
[78]MASCI J,MEIER U,CIREŞAN D,et al.Stacked convolutional auto-encoders for hierarchical feature extraction[C]//International Conference on Artificial Neural Networks.Heidelberg:Springer,2011:52-59.
[79]CHEN X,DUAN Y,HOUTHOOFT R,et al.Infogan:Inter-pretable representation learning by information maximizing generative adversarial nets[C]//Advances in Neural Information Processing Systems.2016:2172-2180.
[80]GANIN Y,USTINOVA E,AJAKAN H,et al.Domain-adversarial training of neural networks[J].The Journal of Machine Learning Research,2016,17(1):2096-2030.
[81]REZAEI A,XIAO C,GAO J,et al.Protecting Sensitive Attri-butes via Generative Adversarial Networks[J].arXiv:1812.10193,2018.
[82]ZHOU F,GAO Q,TRAJCEVSKI G,et al.Trajectory-UserLinking via Variational AutoEncoder[C]//IJCAI.2018:3212-3218.
[83]DIAO W,SUN X,DOU F,et al.Object recognition in remotesensing images using sparse deep belief networks[J].Remote Sensing Letters,2015,6(10):745-754.
[84]CUI Z,CAO Z,YANG J,et al.Hierarchical recognition system for target recognition from sparse representations[J].Mathematical Problems in Engineering,2015.
[1] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺.
时序知识图谱表示学习
Temporal Knowledge Graph Representation Learning
计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204
[4] 王剑, 彭雨琦, 赵宇斐, 杨健.
基于深度学习的社交网络舆情信息抽取方法综述
Survey of Social Network Public Opinion Information Extraction Based on Deep Learning
计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099
[5] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[6] 姜梦函, 李邵梅, 郑洪浩, 张建朋.
基于改进位置编码的谣言检测模型
Rumor Detection Model Based on Improved Position Embedding
计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046
[7] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[8] 胡艳羽, 赵龙, 董祥军.
一种用于癌症分类的两阶段深度特征选择提取算法
Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification
计算机科学, 2022, 49(7): 73-78. https://doi.org/10.11896/jsjkx.210500092
[9] 程成, 降爱莲.
基于多路径特征提取的实时语义分割方法
Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction
计算机科学, 2022, 49(7): 120-126. https://doi.org/10.11896/jsjkx.210500157
[10] 侯钰涛, 阿布都克力木·阿布力孜, 哈里旦木·阿布都克里木.
中文预训练模型研究进展
Advances in Chinese Pre-training Models
计算机科学, 2022, 49(7): 148-163. https://doi.org/10.11896/jsjkx.211200018
[11] 周慧, 施皓晨, 屠要峰, 黄圣君.
基于主动采样的深度鲁棒神经网络学习
Robust Deep Neural Network Learning Based on Active Sampling
计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044
[12] 苏丹宁, 曹桂涛, 王燕楠, 王宏, 任赫.
小样本雷达辐射源识别的深度学习方法综述
Survey of Deep Learning for Radar Emitter Identification Based on Small Sample
计算机科学, 2022, 49(7): 226-235. https://doi.org/10.11896/jsjkx.210600138
[13] 王君锋, 刘凡, 杨赛, 吕坦悦, 陈峙宇, 许峰.
基于多源迁移学习的大坝裂缝检测
Dam Crack Detection Based on Multi-source Transfer Learning
计算机科学, 2022, 49(6A): 319-324. https://doi.org/10.11896/jsjkx.210500124
[14] 楚玉春, 龚航, 王学芳, 刘培顺.
基于YOLOv4的目标检测知识蒸馏算法研究
Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4
计算机科学, 2022, 49(6A): 337-344. https://doi.org/10.11896/jsjkx.210600204
[15] 周志豪, 陈磊, 伍翔, 丘东亮, 梁广升, 曾凡巧.
基于SMOTE-SDSAE-SVM的车载CAN总线入侵检测算法
SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm
计算机科学, 2022, 49(6A): 562-570. https://doi.org/10.11896/jsjkx.210700106
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!