Author of the publication

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering.

, , , , and . IEEE Access, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Association rule mining with fuzzy linguistic information based on attribute partial ordered structure., , , , , and . Soft Comput., 27 (23): 17447-17472 (December 2023)A novel collaborative optimization algorithm in solving complex optimization problems., , , , , and . Soft Comput., 21 (15): 4387-4398 (2017)The Degasperis-Procesi equation with a strong dispersive term and its multi-peakon solutions., and . Appl. Math. Lett., (2022)Drug-drug interaction extraction from biomedical literature using support vector machine and long short term memory networks., , , and . Inf. Sci., (2017)HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering., , , , and . IEEE Access, (2023)An Optimization of Master S-N Curve Fitting Method Based on Improved Neighborhood Rough Set., , , and . IEEE Access, (2021)Automatic Detection of the Guard Interval Length in OFDM System.. J. Commun., 1 (6): 28-32 (2006)A concept lattice-based expert opinion aggregation method for multi-attribute group decision-making with linguistic information., , , , , and . Expert Syst. Appl., 237 (Part B): 121485 (March 2024)(alpha, beta)-Ordered Linear Resolution of Intuitionistic Fuzzy Propositional Logic., , , , and . ISKE, page 341-344. IEEE, (2015)Optimum TCM Codes Design for Gaussian Channels by Considering Both Euclidean and Hamming Distances., , and . ICC, page 1-5. IEEE, (2009)