[1]黄敏, 黄晶. 算网融合中的网络安全问题浅析[J]. 工业信息安全 2023, (1): 3541[2]陈红松, 陈京九. 基于统计的物联网分布式拒绝服务攻击检测[J]. 吉林大学学报: 工学版, 2020, 50(5): 18941904[3]钟昱, 黄振南, 谢惠超, 等. 一种基于半监督学习的网络异常流量检测方法[J]. 广西大学学报: 自然科学版, 2024, 49(3): 563574[4]王光明, 李冬青, 蒋从锋. 不平衡数据集下的数据中心网络流量异常检测[JOL]. 计算机工程 [20250121]. https:doi.org10.19678j.issn.10003428.0069281[5]魏忠达. 基于深度强化学习的网络流量异常检测研究[D]. 北京: 北京化工大学, 2021[6]张光华, 王子昱, 蔡明伟. 基于不平衡数据的物联网异常流量检测[J]. 信息安全研究, 2024, 10(11): 10121019[7]Qian Yiyue, Zhang Yiming, Ye Yanfang, et al. Distilling meta knowledge on heterogeneous graph for illicit drug trafficker detection on social media[C] Proc of Conf on Neural Information Processing Systems. New York: ACM, 2021: 421432[8]Ji Houye, Wang Xiao, Shi Chuan, et al. Heterogeneous graph attention network[C] Proc of the Web Conference. New York: ACM, 2023: 521532[9]Yang Luwei, Xiao Zhibo, Jiang Wen, et al. Dynamic heterogeneous graph embedding using hierarchical attentions[C] Proc of European Conf on Information Retrieval. New York: ACM, 2020: 425432[10]Rinu B, Alexander I. Semisupervised fewshot learning with MAML[C] Proc of Int Conf on Learning Representations. Piscataway, NJ: IEEE, 2018[11]Wang Yuxiong, Girshick R, Hebert M, et al. Lowshot learning from imaginary data[C] Proc of Computer Visionand Pattern Recognition. Piscataway, NJ: IEEE, 2018: 72787286[12]Zhang Xueting, Qiang Yuting, Flood S, et al. Deep comparison: Relation columns for fewshot learning[JOL]. Computing Research Repository, 2018 [20250115]. https:arxiv.orgabs1811.07100 |