Computer Science ›› 2024, Vol. 51 ›› Issue (5): 346-354.doi: 10.11896/jsjkx.231000027
• Information Security • Previous Articles Next Articles
ZHOU Zunlong, CHEN Wen, MA Xinlei
CLC Number:
[1]FORREST S,PERELSON A,ALLEN L,et al.Self-nonself discrimination in a computer[C]//IEEE Symposium on Research in Security and Privacy.1994:202-212. [2]GONZALEZ F,DASGUPTA D,NINO L.A randomized real-valued negativeselection algorithm[C]//Proc.2nd Symp.Artificial Immune Systems.2003:261-272. [3]PERELSON A S,WEISBUCH G.Immunology for physicists[J].Reviews of Modern Physics,1997,69(4):1219-1267. [4]IDRIS I,SELAMAT A,OMATU S.Hybrid email spam detection model with negative selection algorithm and differential evolution[J].Engineering Applications of Artificial Intelligence,2014,28:97-110. [5]LUO W,WANG J,WANG X.Evolutionary negative selection algorithms for anomaly detection[C]//Proceedings of 8th Joint Conference on Information Sciences.Salt Lake City,America,2005,1:3. [6]POGGIOLINI M,ENGELBRECHT A.Application of the feature-detection rule to the negative selection algorithm[J].Expert Systems with Applications,2013,40(8):3001-3014. [7]MA W,TRAN D,SHARMAD.Negative selection with antigen feedback in intrusion detection[C]//Artificial Immune Systems:7th International Conference(ICARIS 2008).Berlin,Heidelberg:Springer,2008:200-209. [8]OSTASZEWSKI M,SEREDYNSKI F,BOUVRYP.Immuneanomaly detection enhanced with evolutionary paradigms[C]//Proceedings of the 8th annual conference on Genetic and Evolutionary Computation.2006:119-126. [9]OSTASZEWSKI M,SEREDYNSKI F,BOUVRYP.Coevolu-tionary-based mechanisms for network anomaly detection[J].Journal of Mathematical Modelling and Algorithms,2007,6:411-431. [10]CHIKH R,CHIKHIS.Clustered negative selection algorithmand fruit fly optimization for email spam detection[J].Journal of Ambient Intelligence and Humanized Computing,2019,10(1):143-152. [11]FOULADVAND S,OSAREH A,SHADGARB,et al.DENSA:An effective negative selection algorithm with flexible boundaries for self-space and dynamic number of detectors[J].Engineering Applications of Artificial Intelligence,2017,62:359-372. [12]CHMIELEWSKI A.Tolerant V-Detector algorithm[J].Journal of Physics:Conference Series,2018,1061(1):012021. [13]YANG C,JIA L,CHEN B Q,et al.Negative selection algorithm based on antigen density clustering[J].IEEE Access,2020,8:44967-44975. [14]CHEN W,LI T,LIU X J,et al.A negative selection algorithm based on hierarchical clustering of self set[J].Science China Information Sciences,2013,56:1-13. [15]CHEN W,DING X M,LI T,et al.Negative selection algorithm based on grid file of the feature space[J].Knowledge-Based Systems,2014,56:26-35. [16]ZHU F,CHEN W,YANG H,et al.A quick negative selection algorithm for one-class classification in big data era[J/OL].Mathematical Problems in Engineering,2017.https://www.hindawi.com/journals/mpe/2017/3956415/. [17]ZHOU X,TAN W.An Improved Artificial Immune Negative Selection Algorithm[C]//2022 7th International Conference on Intelligent Computing and Signal Processing(ICSP).IEEE,2022:237-241. [18]SUN P,BAN L,JIAN H.Improved self-adaptive negative selection algorithm with double clustering for infrared target extraction[C]//2022 IEEE 5th International Conference on Automation,Electronics and Electrical Engineering(AUTEEE).IEEE,2022:378-382. [19]NUHU A R,GUPTA K D,BEDADA W B,et al.Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints[C]//2022 IEEE Symposium Series on Computational Intelligence(SSCI).IEEE,2022:413-420. [20]MO J,YANG H.Sampled Value Attack Detection for Busbar Differential Protection Based on a Negative Selection Immune System[J].Journal of Modern Power Systems and Clean Energy,2022,11(2):421-433. [21]ZHANG G,HE J,LI W,et al.DGA-PSO:An improved detector generation algorithm based on particle swarm optimization in negative selection[J].Knowledge-Based Systems,2023,278:110892. [22]ABID A,KHAN M T,HAQI U,et al.An improved negative selection algorithm-based fault detection method[J].IETE Journal of Research,2022,68(5):3406-3417. [23]CHAUDHARI S,SHEVADE S.Learning from positive and unlabelled examples using maximum margin clustering[C]//Neural Information Processing:19th International Conference(ICONIP 2012).Berlin,Heidelberg:Springer,2012:465-473. [24]ELKAN C.The foundations of cost-sensitive learning[C]//International Joint Conference on Artificial Intelligence.Lawrence Erlbaum Associates Ltd,2001:973-978. [25]KIRYO R,NIU G,DU PLESSISM C,et al.Positive-unlabeled learning with non-negative risk estimator[J].Advances in Neural Information Processing Systems,2017,30:1675-1685. [26]GUO T,XU C,HUANG J,et al.On positive-unlabeled classification in GAN[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8385-8393. [27]LIANG S,ZHANG Y,MA J.Active model selection for positive unlabeled time series classification[C]//2020 IEEE 36th International Conference on Data Engineering(ICDE).IEEE,2020:361-372. [28]DEVORE J L.Probability and Statistics for Engineering and the Sciences[M].Belmont:Duxbury Press,1995. [29]GOLDMAN S,ZHOU Y.Enhancing supervised learning withunlabeled data[C]//ICML.2000:327-334. [30]ANGLUIN D,LAIRD P.Learning from noisy examples[J].Machine Learning,1988,2:343-370. |
[1] | JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331. |
[2] | YANG Chao, QIN Ting-dong, FAN Bo, LI Tao. Study on Detection of Weibo Spammers Based on Danger Theory in Artificial Immunity System [J]. Computer Science, 2018, 45(11): 138-142. |
[3] | LIU Nian,LIU Sun-jun,LIU Yong,ZHAO Hui. Method of Network Security Situation Awareness Based on Artificial Immunity System [J]. Computer Science, 2010, 37(1): 126-129. |
[4] | CHAI Zheng-yi, WANG Hong-hai. Study of Anomaly Intrusion Detection System on False Positive Rate [J]. Computer Science, 2009, 36(11): 68-70. |
|