Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 433-437.
• Information Security • Previous Articles Next Articles
WGAN Ting-ting, ZHU Jiang
CLC Number:
[1]谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报(自然科学版),2013(12):1750-1760. [2]石波,谢小权.基于D-S证据理论的网络安全态势预测方法研究[J].计算机工程与设计,2013,34(3):821-825. [3]陈善学,杨政,朱江,等.一种基于累加PSO-SVM的网络安全态势预测模型[J].计算机应用研究,2015,32(6):1778-1781. [4]田庆安,郭玉锦,王文涛.基于小波与DBN的负荷预测模型[J].兰州理工大学学报,2017,43(2):110-114. [5]ZHANG H,XU T,LI H.StackGAN:Text to Photo-Realistic Image Synthesis with Stacked Generative Adversarial Networks[C]∥IEEE International Confernece on Computer Vision(ICCV),2016:5908-5916. [6]吴昊.随机森林预测与纳什均衡策略的高职英语教学模式研究[J].佳木斯职业学院学报,2017(2). [7]CHANG J,SCHERER S.Learning representations of emotional speech with deep convolutional generative adversarial networks[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2017:2746-2750. [8]ZHAO Y,TAKAKI S,LUONG H T,et al.Wasserstein GAN Waveform Loss-based acoustic model training form Multi-speaker Text-toSpeechsynthesis systems using a wav Net roco-der[J].IEEE Access,2017:7(1):1-10. [9]王峰,何俊.博弈论在通信对抗态势预测中的应用[J].运筹与管理,2011,20(2):132-136. [10]RADFORD A,METZ L,CHINTALA S.Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks[J].Computer Science,2015. [11]朱红春,黄伟,刘海英,等.基于KL散度的面向对象遥感变化检测[J].国土资源遥感,2017,29(2):46-52. [12]张妍,韩光威,陆宁云,等.基于JS散度的轨道车辆门系统健康状态评估方法[J].机械设计与制造工程,2017,46(11):122-127. [13]SRIVASTAVA A,VALKOV L,RUSSELL C,et al.VEEGAN:Reducing Mode Collapse in GANs using Implicit Variational Learning[J].arXiv:1705.07761,2017. [14]王群,董文略,杨莉.基于Wasserstein距离和改进K-medoids聚类的风电/光伏经典场景集生成算法[J].中国电机工程学报,2015,35(11):2654-2661. [15]ARJOVSKY M,CHINTALA S,BOTTOU L.Wasserstein GAN[J].2017. [16]NAKAJO K.Improved gradient method for monotone and lipschitz continuous mappings in banach spaces[J].Acta Mathematica Scientia(English Series),2017,37(2):342-354. [17]李南星,盛益强,倪宏.基于LM算法的MLP模型及其应用[J].网络新媒体技术,2018,7(1):59-63. [18]MUKKAMALA M C,HEIN M.Variants of RMSProp and Adagrad with Logarithmic Regret Bounds[J].IEEE Transactions Biomed Engineering,2017,5(6):1220-1228. [19]QIU Z,YAN Z,FEI Y,et al.RGB-DI Images and Fall Convolution Nuernal Network-Based Outdoor Scene Understanding for Mobile Robots.IEEE Transactions on Instrumentation & Measurement,2018,1(99):1-11. [20]IOFFE S,SZEGEDY C.Batch Normalization:Accelerating Deep Network Training by Reducing Internal Covariate Shift[J].arXiv:1502.03167,2015. [21]陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. |
[1] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[2] | HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346. |
[3] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[4] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[5] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[6] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[7] | YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192. |
[8] | XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223. |
[9] | CHEN Zhuang, ZOU Hai-tao, ZHENG Shang, YU Hua-long, GAO Shang. Diversity Recommendation Algorithm Based on User Coverage and Rating Differences [J]. Computer Science, 2022, 49(5): 159-164. |
[10] | DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202. |
[11] | GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328. |
[12] | LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184. |
[13] | SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39. |
[14] | LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91. |
[15] | TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115. |
|