参考文献
[1]Sayadi S, Rejeb S B, Choukair Z. Anomaly detection model over blockchain electronic transactions[C] Proc of the 15th Int Wireless Communications and Mobile Computing Conf (IWCMC). Piscataway, NJ: IEEE, 2019: 895900[2]Voronov T, Raz D, Rottenstreich O. Scalable blockchain anomaly detection with sketches[C] Proc of the 2021 IEEE Int Confon Blockchain (Blockchain). Piscataway, NJ: IEEE, 2021: 110[3]Fan W, Hong H, Kim J et al.Lightweight and identifieroblivious engine for cryptocurrency networking anomaly detection[JOL]. IEEE Trans on Dependable and Secure Computing, 2022 [20220112]. https:ieeexplore.ieee.orgabstractdocument9720221[4]Jin C, Jin J, Zhou J, et al. Heterogeneous feature augmentation for ponzi detection in Ethereum[J]. IEEE Trans on Circuits and Systems II: Express Briefs, 2022, 69(9): 39193923[5]杜炜, 李剑. 基于半监督学习的安卓恶意软件检测及其恶意行为分析[J]. 信息安全研究, 2018, 4(3): 242250[6]Qi M, Ke G, Wang T, et al. A communicationefficient parallel algorithm for decision tree[J]. arXiv preprint, arXiv: 1611.01276, 2016 [7]Qi M. LightGBM: A highly efficient gradient boosting decision tree[C] Proc of the 31st Int Conf on Neural Information Processing Systems (NIPS’17). Long Beach, CA: Curran Associates Inc, 2017: 31493157[8]Jin G R. Communication and memory efficient parallel decision tree construction[C] Proc of the 2003 SIAM Int Conf on Data Mining. Philadelphia, PA: SIAM, 2003: 119129[9]魏志强, 张浩, 陈龙.一种采用SmoteTomek和LightGBM算法的Web异常检测模型[J].小型微型计算机系统, 2020, 41(3): 587592[10]莫坤, 王娜, 李恒吉, 等. 基于LightGBM的网络入侵检测系统[J]. 信息安全研究, 2019, 5(2): 152156[11]Li P, Burges C J C, Wu Q. McRank: Learning to rank using multiple classification and gradient boosting[C] Proc of Int Conf on Neural Information Processing Systems. Vancouver: Curran Associates Inc, 2007: 897904[12]Shi H. Bestfirst decision tree learning[D]. Hamilton: The University of Waikato, 2007[13]Sun X, Liu M, Sima Z. A novel cryptocurrency price trend forecasting model based on LightGBM[J]. Finance Research Letters, 2020, 32: 101084[14]Chen T, Guestrin C. XGBoost: A scalable tree boosting system[C] Proc of the 22nd ACM SIGKDD Int Confon Knowledge Discovery and Data Mining(KDD’16). New York: ACM, 2016: 785794[15]李曼, 车向北, 张宗包, 等. 软件定义网络中基于XGBoost算法的DDoS攻击检测[J]. 信息安全研究, 2021, 7(11): 10311036[16]Prokhorenkova L, Gusev G, Vorobev A, et al. CatBoost: Unbiased boosting with categorical features[C] Advances in Neural Information Processing Systems 31 (NeurIPS 2018). Montral, Canada. Curran Associates Inc, 2018: 66396649[17]Fauvel K, Fromont E, Masson V, et al. XEM: An explainablebydesign ensemble method for multivariate time series classification[J]. Data Mining and Knowledge Discovery, 2022, 36(3): 917957[18]Louridas P, Ebert C. Machine learning[J]. IEEE Software, 2016, 33(5): 110115[19]Capriotti E, Casadio R. KFold: A tool for the prediction of the protein folding kinetic order and rate[J]. Bioinformatics, 2007, 23(3): 385386[20]Cateni S, Colla V, Vannucci M. Novel resampling method for the classification of imbalanced datasets for industrial and other realworld problems[C] Proc of Int Conf on Intelligent Systems Design & Applications. Piscataway, NJ: IEEE, 2012: 402407[21]Friedman J H. Greedy function approximation: A gradient boosting machine[J]. Annals of Statistics, 2001, 29(5): 11891232[22]Huang Qiujun, Mao Jingli, Liu Yong. An improved grid search algorithm of SVR parameters optimization[C] Proc of the 14th IEEE Int Conf on Communication Technology. Piscataway, NJ: IEEE, 2012: 10221026
|