共 50 条
- [11] Tool Wear Detection Based on Improved CNN-BiLSTM Model Zhongguo Jixie Gongcheng/China Mechanical Engineering, 2022, 33 (16): : 1940 - 1947and1956
- [12] An Intrusion Detection Model Based on Improved Whale Optimization Algorithm and XGBoost PROCEEDINGS OF THE THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 1, 2021, : 542 - 547
- [15] Multi-point leak detection method based on improved VMD and TWSVM Zhendong yu Chongji/Journal of Vibration and Shock, 2021, 40 (17): : 271 - 278
- [16] Anomaly Detection Method of Network Traffic Based on Secondary Feature Extraction and BiLSTM-Attention Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (12): : 4539 - 4547
- [18] Substation Equipment Anomaly Detection Method Improved Based on AnoGAN PROCEEDINGS OF THE 4TH INTERNATIONAL SYMPOSIUM ON NEW ENERGY AND ELECTRICAL TECHNOLOGY, ISNEET 2023, 2024, 1255 : 337 - 345
- [19] An Improved Anomaly Detection Method Based on Fuzzy Association Rules 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 474 - 477
- [20] An Improved Data Anomaly Detection Method Based on Isolation Forest 2017 10TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2017, : 287 - 291