[1] 任美玉,符建厂.网络安全态势评估与预测关键技术研究[J].网络安全技术与应用,2015(11):124-125
[2] Haack,Fink G,Fulp E,et al. Cooperative Infrastructure Defense[EB/OL].[2019-03-15].http://www.vizsec.org/workshop2008/fink.pdf. 2014-05-06
[3] 刘效武,王慧强,吕宏武,等.网络安全态势认知融合感控模型[J].软件学报,2016,27(8):2099-2114
[4] 贾文娟,张煜东.自编码器理论与方法综述[J].计算机系统应用,2018,27(5):1-9
[5]Rumelhart D E. Learning Representations by back-propagating errors[J]. Nature, 1986, 23
[6] Hinton G E,Salakhutdinov R R. Reducing the dimensionality of data with neural networks.[J]. Science,2006,313(5786)
[7] Bengio Y, Lamblin P, Popovici D, et al. Greedy layer-wise training of deep networks[C]//Advances in Neural Information Processing Systems. 2007: 153-160
[8] Vincent P, Larochelle H, Bengio Y, et al. Extracting and composing robust features with denoising autoencoders[C]//Proc of the 25th International Conf on Machine Learning. New York:ACM, 2008: 1096-1103
[9] Masci J, Meier U, Cireşan D, et al. Stacked convolutional auto-encoders for hierarchical feature
extraction[J]. Artificial Neural Networks and Machine Learning–ICANN, 2011, 2011: 52-59
[10] 袁非牛,章琳,史劲亭,等.自编码神经网络理论及应用综述[J].计算机学报,2019,42(1):203-230
[11] 吴海燕. 基于自动编码器的半监督表示学习与分类学习研究[D].重庆:重庆大学,2015
[12] 张开生,黄谦.基于粒子群优化BP神经网络的脉象识别方法[J].现代电子技术,2018,41(3):96-100,106
[13] 危胜军,胡昌振,姜飞.基于BP神经网络改进算法的入侵检测方法[J].计算机工程,2005(13):154-155,158
[14] 曲建岭,杜辰飞,邸亚洲,等.深度自动编码器的研究与展望[J].计算机与现代化,2014(8):128-134
[15] 张丹,郑瑞娟,吴庆涛,等.基于自律计算的网络安全态势感知模型[J].计算机应用,2013,33(2):404-407
|