2021
DOI: 10.1109/mnet.011.2000331
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Code Detection under 5G HetNets Based on a Multi-Objective RBM Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
124
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 122 publications
(124 citation statements)
references
References 14 publications
0
124
0
Order By: Relevance
“…With the development of service computing and cloud computing, a variety of online Web services have emerged on the Internet. [20][21][22][23] Among them, the discovery and mining of Web services has become a hot research direction. Some research works show that efficient Web service classification can effectively improve the performance of Web service discovery, 24,25 service selection, service ranking, and service recommendation.…”
Section: Related Workmentioning
confidence: 99%
“…With the development of service computing and cloud computing, a variety of online Web services have emerged on the Internet. [20][21][22][23] Among them, the discovery and mining of Web services has become a hot research direction. Some research works show that efficient Web service classification can effectively improve the performance of Web service discovery, 24,25 service selection, service ranking, and service recommendation.…”
Section: Related Workmentioning
confidence: 99%
“…Many‐objective particle swarm optimization methods are proposed for the green coal production problem 11,12 . Multiobjective restricted Boltzmann machine network is designed for malicious code detection under 5G HetNets 13 . Cui et al 14 deploy subspace clustering strategy for data analysis on edge servers.…”
Section: Introductionmentioning
confidence: 99%
“…11,12 Multiobjective restricted Boltzmann machine network is designed for malicious code detection under 5G HetNets. 13 Cui et al 14 deploy subspace clustering strategy for data analysis on edge servers. In stock market, machine learning methods are also applied to model the relationship between the features from technical analysis and future stock trend, 15 such as random forest, artificial neural networks (ANNs), support vector machine (SVM), 16,17 logistic regression, and Naïve Bayes.…”
mentioning
confidence: 99%
“…Along with the development of deep learning-based methods, [16][17][18][19] the general object detection methods also achieved remarkable developments in both detection accuracy and efficiency, such as the Faster R-CNN, 20 SSD, 21 and YOLO. In this study, we regard the recognition of tooth-marked tongue and cracked tongue as an object detection task, which simultaneously identifies the tooth-marked tongue and cracked tongue and locates the position of the tooth-marks and cracks in the tongue images.…”
Section: Introductionmentioning
confidence: 99%