共 30 条
[1]
[Anonymous], 2017, 2017 IEEE WIR COMM N, P1
[2]
[Anonymous], 2008, ADV DATA MINING TECH
[4]
Cho K., 2014, ARXIV14061078, DOI [DOI 10.3115/V1/D14-1179, 10.3115/v1/D14-1179]
[5]
Gao H., 2019, PR MACH LEARN RES
[6]
Grover Jyoti., 2011, P 4 INT C SECURITY I, P151, DOI [10.1145/2070425.2070450, DOI 10.1145/2070425.2070450]
[7]
Grover Jyoti., 2010, Proceedings of the 3rd international conference on Security of information and networks, P249
[8]
Gu PWL, 2017, PROCEEDINGS OF THE 2017 THIRD INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)
[9]
Hao Y, 2011, GLOB TELECOMM CONF
[10]
Kipf T. N., 2017, INT C LEARN REPR ICL, DOI [10.1051/0004-6361/201527329, DOI 10.48550/ARXIV.1609.02907]