Author:
Huang Shih-Chia,Le Trung-Hieu
Reference36 articles.
1. A fuzzy k-nearest neighbor algorithm;Keller,1985
2. A k-nearest neighbor classification rule based on Dempster-Shafer theory;Denoeux;IEEE Trans. Syst. Man Cybern.,1995
3. A branch and bound algorithm for computing k-nearest neighbors;Fukunaga;IEEE Trans. Comput.,1975
4. The distance-weighted k-nearest-neighbor rule;Dudani;IEEE Trans. Syst. Man Cybern.,1976
5. Induction of decision trees;Quinlan;Mach. Learn.,1986
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on Malicious Software Detection Based on CNN-LSTM Hybrid Model;2023 5th International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI);2023-12-15