共 50 条
- [41] Identifying Vulnerable IoT Applications using Deep Learning [J]. PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20), 2020, : 582 - 586
- [42] Identifying influential nodes based on network representation learning in complex networks [J]. PLOS ONE, 2018, 13 (07):
- [43] A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks [J]. IEEE ACCESS, 2020, 8 : 65462 - 65471
- [44] Identifying Malicious Users in the Offshore Leaks Networks via Structural Node Representation Learning [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 5095 - 5101
- [46] Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient [J]. 10TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY AND INTERNET-BASED SYSTEMS SITIS 2014, 2014, : 323 - 330
- [47] Active Learning for IoT Data Prioritization in Edge Nodes Over Wireless Networks [J]. IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 4453 - 4458
- [48] Physical Layer Detection of Malicious Relays in LTE-A Network Using Unsupervised Learning [J]. IEEE ACCESS, 2020, 8 (08): : 154713 - 154726
- [49] Cooperation diversity in multihop wireless networks using opportunistic driven multiple access [J]. 2003 4TH IEEE WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS - SPAWC 2003, 2004, : 170 - 174
- [50] Security Enhancement of Fog Nodes in IoT Networks Using the IBF Scheme [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 119 - 129