[1] |
GAO Ni,GAO Ling,HE Yiyue,et al.Intrusion detection model based on deep belief nets[J].Journal of Southeast University(English Edition),2015,31(3):339-346.
|
[2] |
AMBUSAIDI M A,HE Xiangjian,NANDA P,et al.Building an intrusion detection system using a filter-based feature selection algorithm[J].IEEE Transactions on Computers,2016,65(10):2986-2998.
|
[3] |
杨昆朋.基于深度学习的入侵检测[D].北京:北京交通大学,2015.
|
[4] |
侯杰.基于差分进化与深度学习的入侵检测研究[D].北京:北京理工大学,2016.
|
[5] |
孔令爽.基于深度学习和迁移学习的入侵检测研究[D].济南:山东大学,2018.
|
[6] |
魏思政,刘厚泉,赵志凯.基于DBN-ELM的入侵检测研究[J].计算机工程,2018,44(9):153-158.
|
[7] |
HINTON G E,OSINDERO S,TEH Y W.A fast learning algorithm for deep belief nets[J].Neural Computation,2006,18(7):1527-1554.
|
[8] |
HINTON G E.Training products of experts by minimizing contrastive divergence[J].Neural Computation,2002,14(8):1771-1800.
|
[9] |
HINTON G E.A practical guide to training restricted Boltzmann machines[M]//GOOS G,HARTMANIS J,LEEUWEN J.Neural networks:tricks of the trade.Berlin,Germany:Springer,2012:599-619.
|
[10] |
HUANG Guangbin,ZHU Qinyu,SIEW C K.Extreme learning machine:a new learning scheme of feedforward neural networks[C]//Proceedings of IEEE International Joint Conference on Neural Networks.Washington D.C.,USA:IEEE Press,2004:985-990.
|
[11] |
HUANG Guangbin,ZHOU Hongming,DING Xiaojian,et al.Extreme learning machine for regression and multiclass classification[J].IEEE Transactions on Systems,Man,and Cybernetics,Part B(Cybernetics),2012,42(2):513-529.
|
[12] |
王华忠,俞金寿.核函数方法及其模型选择[J].江南大学学报(自然科学版),2006,5(4):500-504.
|
[13] |
MERCER J.Functions of positive and negative type,and their connection the theory of integral equations[J].Philosophical Transactions of the Royal Society of London,1909,209(441):415-446.
|
[14] |
TAVALLAEE M,BAGHERI E,LU Wei,et al.A detailed analysis of the KDD CUP99 data set[C]//Proceedings of IEEE Symposium on Computational Intelligence for Security and Defense Applications.Washington D.C.,USA:IEEE Press,2009:1-6.
|
[15] |
高强,马艳梅.深度信念网络(DBN)网络层次数量的研究及应用[J].科学技术与工程,2016,16(23):234-238,262.
|