共 164 条
[11]
[Anonymous], 2021, CSE-CIC-IDS2018
[12]
[Anonymous], NIPS 2014 WORKSH DEE
[13]
[Anonymous], 2015, 3 INT C LEARNING REP
[15]
Threat-based Security Analysis for the Internet of Things
[J].
2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT),
2014,
:35-43
[16]
Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
[17]
Badgujar T., 2015, 2015 INT C INNOVATIO, P1, DOI [10.1109/ICIIECS.2015.7193122, DOI 10.1109/ICIIECS.2015.7193122]
[18]
Bangyal W.H., 2018, PAPER PRESENTED P IN, P1
[19]
Ben Ayed A, 2014, 2014 6TH INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR), P331, DOI 10.1109/SOCPAR.2014.7008028
[20]
Learning Deep Architectures for AI
[J].
FOUNDATIONS AND TRENDS IN MACHINE LEARNING,
2009, 2 (01)
:1-127