共 50 条
[41]
Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User
[J].
2014 12TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT),
2014,
:287-294
[42]
A widespread survey on machine learning techniques and user substantiation methods for credit card fraud detection
[J].
International Journal of Business Intelligence and Data Mining,
2022, 22 (1-2)
:223-247
[43]
Classifying Multilingual User Feedback using Traditional Machine Learning and Deep Learning
[J].
2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019),
2019,
:220-226
[44]
Nonquiet Primary User Detection Scheme
[J].
2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM),
2011,
:473-477
[45]
Implementation of Machine Learning Algorithm for Predicting User Behavior and Smart Energy Management
[J].
2017 1ST IEEE INTERNATIONAL CONFERENCE ON DATA MANAGEMENT, ANALYTICS AND INNOVATION (ICDMAI),
2017,
:24-30
[46]
Research and Mining of Intelligent Home User Behavior Pattern Based on Machine Learning
[J].
2018 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA),
2018,
:131-134
[47]
User Behavior Analysis for Malware Detection
[J].
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II,
2024, 14399
:92-110
[48]
Applying Machine Learning Techniques for Religious Extremism Detection on Online User Contents
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2022, 70 (01)
:915-934
[49]
An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques
[J].
PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT,
2019,
:529-534
[50]
Coexistence of Secondary User Networks under Primary User Constraints in TV White Space
[J].
2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC),
2012,