共 35 条
[21]
Liao K, 2016, PROCEEDINGS OF THE 2016 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P1
[22]
Dynamic Network Anomaly Detection System by Using Deep Learning Techniques
[J].
CLOUD COMPUTING - CLOUD 2019,
2019, 11513
:161-176
[23]
Ludwig S. A., 2017, P IEEE S SERIES COMP, P1
[25]
Möser M, 2017, J CYBERSECURITY, V3, P127, DOI 10.1093/cybsec/tyx007
[26]
Structure and Anonymity of the Bitcoin Transaction Graph
[J].
FUTURE INTERNET,
2013, 5 (02)
:237-250
[28]
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[30]
Aided Selection of Sampling Methods for Imbalanced Data Classification
[J].
CODS-COMAD 2021: PROCEEDINGS OF THE 3RD ACM INDIA JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA (8TH ACM IKDD CODS & 26TH COMAD),
2021,
:198-202