<p>chi(2)-BidLSTM: A Feature Driven Intrusion Detection System Based on chi(2) Statistical Model and Bidirectional LSTM</p> | 0 | 0.34 | 2022 |
Slither: finding local dense subgraphs measured by average degree | 0 | 0.34 | 2022 |
Co-Residence Data Theft Attacks on <italic>N</italic>-Version Programming-Based Cloud Services With Task Cancelation | 0 | 0.34 | 2022 |
Reliability versus Vulnerability of <italic>N</italic>-Version Programming Cloud Service Component With Dynamic Decision Time Under Co-Resident Attacks | 0 | 0.34 | 2022 |
Optimal Preventive Replacement for Cold Standby Systems With Elements Exposed to Shocks During Operation and Task Transfers | 0 | 0.34 | 2022 |
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer | 0 | 0.34 | 2021 |
Optimizing preventive replacement schedule in standby systems with time consuming task transfers. | 0 | 0.34 | 2021 |
Optimal abort rules for additive multi-attempt missions. | 1 | 0.35 | 2021 |
Optimal abort rules and subtask distribution in missions performed by multiple independent heterogeneous units | 0 | 0.34 | 2020 |
Optimal multi-attempt missions with cumulative effect | 0 | 0.34 | 2020 |
Series phased-mission systems with heterogeneous warm standby components. | 0 | 0.34 | 2020 |
Optimal aborting rule in multi-attempt missions performed by multicomponent systems | 2 | 0.36 | 2020 |
Cost minimization of real-time mission for software systems with rejuvenation | 0 | 0.34 | 2020 |
Optimal early warning defense of N-version programming service against co-resident attacks in cloud system | 1 | 0.35 | 2020 |
Optimal Replacement And Reactivation In Warm Standby Systems Performing Random Duration Missions | 0 | 0.34 | 2020 |
Optimization of time constrained N-version programming service components with competing task execution and version corruption processes | 1 | 0.35 | 2020 |
Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack In Iot | 0 | 0.34 | 2019 |
Feature selection based on feature interactions with application to text categorization. | 4 | 0.37 | 2019 |
A Secure Image Tampering Detection and Self-recovery Scheme Using POB Number System over Cloud | 2 | 0.42 | 2019 |
Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map. | 0 | 0.34 | 2019 |
A visually secure image encryption scheme based on parallel compressive sensing. | 1 | 0.35 | 2019 |
A Qos-Driven Approach to the Cloud Service Addressing Attributes of Security. | 0 | 0.34 | 2018 |
An Interaction-Enhanced Feature Selection Algorithm. | 0 | 0.34 | 2018 |
Structured Memetic Automation for Online Human-Like Social Behavior Learning. | 7 | 0.49 | 2017 |
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. | 15 | 0.54 | 2017 |
Maximizing influence under influence loss constraint in social networks. | 5 | 0.39 | 2016 |
A Hierarchical Correlation Model for Evaluating Reliability, Performance, and Power Consumption of a Cloud Service | 13 | 0.66 | 2016 |
On Information Coverage For Location Category Based Point-Of-Interest Recommendation | 16 | 0.61 | 2015 |
Optimal route search with the coverage of users' preferences | 6 | 0.47 | 2015 |
Time-critical interactive dynamic influence diagram. | 2 | 0.51 | 2015 |
A study on like-attracts-like versus elitist selection criterion for human-like social behavior of memetic mulitagent systems | 2 | 0.38 | 2013 |
Optimal Allocation of Multistate Components in Consecutive Sliding Window Systems | 2 | 0.41 | 2013 |
Maximal profit service task partition and distribution in computer grid | 0 | 0.34 | 2013 |
Time-critical dynamic decision making | 5 | 0.46 | 2013 |
Linear Multistate Consecutively-Connected Systems With Gap Constraints | 6 | 0.55 | 2012 |
Linear -Gap Sliding Window Systems | 1 | 0.37 | 2012 |
Combined m-consecutive and k-out-of-n sliding window systems. | 5 | 0.44 | 2012 |
Dynamic ordering-based search algorithm for markov blanket discovery | 1 | 0.35 | 2011 |
Service task partition and distribution in star topology computer grid subject to data security constraints. | 1 | 0.34 | 2011 |
Consequence Oriented Self-Healing and Autonomous Diagnosis for Highly Reliable Systems and Software. | 9 | 0.58 | 2011 |
An influence diagram approach for multiagent time-critical dynamic decision modeling | 3 | 0.49 | 2010 |
Time-Critical Decision Making in Interactive Dynamic Influence Diagram | 3 | 0.49 | 2010 |
Self-healing and Hybrid Diagnosis in Cloud Computing | 22 | 0.95 | 2009 |
Learning Local Components to Understand Large Bayesian Networks | 1 | 0.36 | 2009 |
An intelligent design system for military situation assessment | 0 | 0.34 | 2008 |
Refinement of Bayesian network structures upon new data | 1 | 0.37 | 2008 |
Multiple Approximate Dynamic Programming Controllers for Congestion Control | 0 | 0.34 | 2007 |
Time based congestion control (TBCC) for high speed high delay networks | 0 | 0.34 | 2006 |
A knowledge-based modeling system for time-critical dynamic decision-making | 0 | 0.34 | 2006 |
Constructing Bayesian Network in a Changing World. | 4 | 0.46 | 2005 |