Author:
Yang Yuqi,Bie Rongfang,Wu Hao,Xu Shuaijing,Li Liangchi
Reference24 articles.
1. ”A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Communications Surveys& Tutorials,2016
2. Xinlei Chen and Deng Cai. (2011) ”Large scale spectral clustering with landmark-based representation.” Aaai Conference on Artificial Intelligence AAAI Press.
3. ”Spectral grouping using the nystrom method;Fowlkes;IEEE transactions on pattern analysis and machine intelligence,2004
4. Algorithm as 136: A k-means clustering algorithm;Hartigan;Journal of the Royal Statistical Society. Series C (Applied Statistics),1979
5. Hao Huang, Shinjae Yoo, Dantong Yu, and Hong Qin. (2014) ”Diverse power iteration embeddings and its applications.” 2014 IEEE International Conference on Data Mining (ICDM),: 200–209, IEEE.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献