共 65 条
[51]
Hidayat I, 2022, Journal of Computational and Cognitive Engineering, V2, P88, DOI [10.47852/bonviewjcce2202270, 10.32699/jamasy.v2i6.3993, DOI 10.47852/BONVIEWJCCE2202270, 10.47852/BONVIEWJCCE2202270]
[52]
Sandelin F., 2019, Masters Thesis
[53]
Sharafaldin I, 2019, INT CARN CONF SECU, DOI 10.1109/ccst.2019.8888419
[54]
Tan Z, The Defence of 2D Poisoning Attack
[55]
Tang TA, 2018, 2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), P202, DOI 10.1109/NETSOFT.2018.8460090
[56]
Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (07)
[58]
Wang Peng, 2019, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE). Proceedings, P431, DOI 10.1109/CISCE.2019.00102
[59]
Waskle Subhash, 2020, 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). Proceedings, P803, DOI 10.1109/ICESC48915.2020.9155656
[60]
Williams J.M., 2017, Deep learning and transfer learning in the classification of eeg signals