Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 230200128-10.doi: 10.11896/jsjkx.230200128
• Big Data & Data Science • Previous Articles Next Articles
SHEN Yuancheng1, BAN Rui2, CHEN Xin1, HUA Runduo2, WANG Yunhai1
CLC Number:
[1]WILLIS P J.The challenges in building a carrier-scale IP net-work[J].BT Technology,2000,18(3):11-14. [2]GOZDE B,ALIDSMAN A.AHP integrated TOPSIS and VIKORmethods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles[J].Applied Soft Computing,2021,99(3):1568-4946. [3]SIRIWARDHANA Y,PORAMBAGE P,LIYANAGE M,et al.A survey on mobile augmented reality with 5G mobile edge computing:architectures,applications,and technical aspects[J].IEEE Communications Surveys & Tutorials,2021,23(2):1160-1192. [4]LIU G H,MENG X C,ZHOU X R,et al.Exploring the optimization of China Unicom packet domain IP bearer network architecture for 5G[J].Telecommunications Technology,2019(12):95-98. [5]WANG W Q.PTN network inspection solution for LTE[J].Science and Technology Innovation,2020(27):62-63. [6]LIU H M,CHEN G.Innovative research and practice of net-work operation and maintenance system based on centralization and intelligence[J].China New Communication,2015,17(2):68-71. [7]CUI J.Introduction to the construction of intelligent operation and maintenance mode of 5G network[J].Technology and Market,2021,28(5):126-127. [8]THEO A,NATALI H,SANNE K,et al.In AI we trust? Perceptions about automated decision-making by artificial intelligence[J].AI & SOCIETY,2020,35(3):611-623. [9]GUPTA S,SACHIN M,SAMADRITA,et al.Artificial intelli-gence for decision support systems in the field of operations research:review and future scope of research[J].Annals of Operations Research,2022,308(1):215-274. [10]LIU X W,MA D D,YE X B,et al.Application of AI based Configuration Audit System in 5G Backhaul Network[J].Designing Techniques of Posts and Telecommunications,2021(8):15-19. [11]LIN T L,CHEN J G,GUO W J,et al.Application of big data analysis methods in 5G precision construction[J].Changjiang Information and Communication,2022,35(6):230-232. [12]HOFMANN M J,BIEMANN C,WESTBURY C,et al.SimpleCo-Occurrence Statistics Reproducibly Predict Association Ratings[J].Cogn Sci,2018,42(7):2287-2312. [13]ZHANG J,WANG X,ZHANG H,et al.A novel neural source code representation based on abstract syntax tree[C]//2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).IEEE,2019:783-794. [14]SINAGA K P,YANG M S.Unsupervised K-Means clusteringalgorithm[J].IEEE access,2020,8:80716-80727. [15]LIU X,ZHU P D,MI Q,et al.Rule-based anomaly detection for inter-domain routing systems[J].Journal of the National University of Defense Technology,2006(3):71-76. [16]SMRITHY G S,RAMADOSS B.A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks[J].The Computer Journal,2022,65(7):1752-1759. [17]YU Y J,YIN Y F,LIU Q.Analysis of the distribution pattern of high-frequency Chinese character string mutual information based on large-scale corpus[J].Computer Science,2014,41(10):276-282. [18]PINCOMBE B.Anomaly Detection in Time Series of GraphsUsing ARMA Processes[J].Asor Bulletin,2005,24(1):67-75. [19]ROODBANDI J,SADAT A,CHOOBINEH A,et al.Research outputs in ergonomics and human factors engineering:a bibliometric and co-word analysis of content and contributions[J].International Journal of Occupational Safety and Ergonomics,2022,28(4):2010-2021. [20]LIU D P,ZHAO Y J,XU H W,et al.Opprentice:TowardsPractical and Automatic Anomaly Detection through Machine Learning[C]//15th Internet Measurement Conference.Tokyo,Japan.New York:ACM,2015:211-224. [21]YANG X W,LATECKI L J,POKRAJAC D.Outlier Detection with Globally Optimal Exemplar-based GMM[C]//International Conference on Data Mining.SDM,Sparks,Nevada,USA.New York:SDM,2009:145-154. [22]RASHIDI L,HASHEMI S,HAMZEH A.Anomaly detection in categorical datasets using bayesian networks[C]//International Conference on Artificial Intelligence and Computational Intelligence.2011:610-619. [23]SHABTAY,LIOR,et al.A guided FP-Growth algorithm formining multitude-targeted item-sets and class association rules in imbalanced data[J].Information Sciences,2021,553(1):353-375. [24]MAHDI B,SOHEIL E,MOHAMMAD G,et al.Approximating edit distance in truly subquadratic time:Quantum and mapreduce[J].Journal of the ACM,2021,68(3):1-41. [25]MERIGOUX D,MONAT R,PROTZENKO J.A modern compiler for the french tax code[C]//Proceedings of the 30th ACM SIGPLAN International Conference on Compiler Construction.2021. [26]DONG Z B.Analytical and Research on 3D Point Cloud Segmentation Algorithm Based on Improved Euclidean Distance [D].Beijing:North China Electric Power University,2022:4-38. [27]CAO J D.Research on cryptographic table encryption algorithm based on Hash function and triplet [J].Software Guide,2012,11(11):54-56. [28]ZHAO X H.Research on encryption method based on DNAcomputing[D].Zhengzhou:Zhengzhou Institute of Light Industry,2013. [29]YI J,QIU M X.Design of user password authentication scheme based on ACSII code and random numbers[J].Computer and Digital Engineering,2011,39(3):102-104. |
[1] | XU Jie, WANG Lisong. Contrastive Clustering with Consistent Structural Relations [J]. Computer Science, 2023, 50(9): 123-129. |
[2] | LI Hui, LI Wengen, GUAN Jihong. Dually Encoded Semi-supervised Anomaly Detection [J]. Computer Science, 2023, 50(7): 53-59. |
[3] | LIANG Yunhui, GAN Jianwen, CHEN Yan, ZHOU Peng, DU Liang. Unsupervised Feature Selection Algorithm Based on Dual Manifold Re-ranking [J]. Computer Science, 2023, 50(7): 72-81. |
[4] | HENG Hongjun, ZHOU Wenhua. Anomaly Detection Method Based on Context Information Fusion and Noise Adaptation [J]. Computer Science, 2023, 50(7): 237-245. |
[5] | SUN Kaiwei, WANG Zhihao, LIU Hu, RAN Xue. Maximum Overlap Single Target Tracking Algorithm Based on Attention Mechanism [J]. Computer Science, 2023, 50(6A): 220400023-5. |
[6] | ZHANG Guohua, YAN Xuefeng, GUAN Donghai. Anomaly Detection of Time-series Based on Multi-modal Feature Fusion [J]. Computer Science, 2023, 50(6A): 220700094-7. |
[7] | GU Shouke, CHEN Wen. Function Level Code Vulnerability Detection Method of Graph Neural Network Based on Extended AST [J]. Computer Science, 2023, 50(6): 283-290. |
[8] | SUN Xuekui, DAI Hua, ZHOU Jianguo, YANG Geng, CHEN Yanli. LTTFAD:Log Template Topic Feature-based Anomaly Detection [J]. Computer Science, 2023, 50(6): 313-321. |
[9] | LI Huilai, YANG Bin, YU Xiuli, TANG Xiaomei. Explainable Comparison of Software Defect Prediction Models [J]. Computer Science, 2023, 50(5): 21-30. |
[10] | SUN Xuekai, JIANG Liehui. Code Embedding Method Based on Neural Network [J]. Computer Science, 2023, 50(5): 64-71. |
[11] | ZHAO Song, FU Hao, WANG Hongxing. Pseudo-abnormal Sample Selection for Video Anomaly Detection [J]. Computer Science, 2023, 50(5): 146-154. |
[12] | ZHANG Renbin, ZUO Yicong, ZHOU Zelin, WANG Long, CUI Yuhang. Multimodal Generative Adversarial Networks Based Multivariate Time Series Anomaly Detection [J]. Computer Science, 2023, 50(5): 355-362. |
[13] | LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322. |
[14] | CUI Jingsong, ZHANG Tongtong, GUO Chi, GUO Wenfei. Network Equipment Anomaly Detection Based on Time Delay Feature [J]. Computer Science, 2023, 50(3): 371-379. |
[15] | RAO Dan, SHI Hongwei. Study on Air Traffic Flow Recognition and Anomaly Detection Based on Deep Clustering [J]. Computer Science, 2023, 50(3): 121-128. |
|