Author of the publication

Application of a Distance-weighted KNN Algorithm Improved by Moth-Flame Optimization in Network Intrusion Detection.

, , , , , and . IDAACS-SWS, page 166-170. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on the Application of Medical Big Data., , , and . ICCSE, page 478-482. IEEE, (2019)Application of a Distance-weighted KNN Algorithm Improved by Moth-Flame Optimization in Network Intrusion Detection., , , , , and . IDAACS-SWS, page 166-170. IEEE, (2018)Elaborating the Bayesian Priors in Unsupervised Graph Embedding via Graph Concepts., , , and . ADMA, volume 12447 of Lecture Notes in Computer Science, page 176-190. Springer, (2020)Gaitdlf: global and local fusion for skeleton-based gait recognition in the wild., , , , and . J. Supercomput., 80 (12): 17606-17632 (August 2024)Design of Video Cloud Networking Scheme in expressway., , , and . ICCSE, page 345-348. IEEE, (2020)Research on Traffic Flow Prediction Based on Spatio-Temporal Correlation Analysis., and . ICCSE (1), volume 2023 of Communications in Computer and Information Science, page 339-346. Springer, (2023)An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection., , , , , and . IDAACS-SWS, page 10-15. IEEE, (2018)A Node Deployment Optimization Method of WSN Based on Ant-Lion Optimization Algorithm., , , and . IDAACS-SWS, page 88-92. IEEE, (2018)Discovering Parallelisms in Python Programs., , , , , and . ESEC/SIGSOFT FSE, page 832-844. ACM, (2023)Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection., , , , , , and . IDAACS-SWS, page 16-20. IEEE, (2018)