共 47 条
[1]
[Anonymous], 2012, Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 2, ACL '12
[2]
[Anonymous], 2013, P 51 ANN M ASS COMP
[3]
[Anonymous], NAT WORKSH DES AN AL
[4]
Avvenuti M, 2014, 2 IEEE INT WORKSH SO
[5]
Becker H., 2011, Icwsm
[6]
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
[J].
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016,
2016, 10018
:141-152
[7]
Efficient authentication, traitor detection, and privacy-preserving for the most common queries in two-tiered wireless sensor networks
[J].
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015),
2015,
:365-372
[8]
Caragea C, 2016, P 13 INT ISCRAM C RI
[9]
Chatfield AT, 2013, 46 HAW IEEE INT C SY
[10]
Chen YB, 2015, PROCEEDINGS OF THE 53RD ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 7TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING, VOL 1, P167