Search alternatives:
modeling algorithm » making algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
data modeling » data modelling (Expand Search), data models (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
a algorithm » _ algorithm (Expand Search), b algorithm (Expand Search), _ algorithms (Expand Search)
develop a » develop _ (Expand Search), developing a (Expand Search)
modeling algorithm » making algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
data modeling » data modelling (Expand Search), data models (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
a algorithm » _ algorithm (Expand Search), b algorithm (Expand Search), _ algorithms (Expand Search)
develop a » develop _ (Expand Search), developing a (Expand Search)
-
1
-
2
-
3
-
4
-
5
Evaluation of model aggregation algorithms.
Published 2024“…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …”
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
Model-Based Clustering of Categorical Data Based on the Hamming Distance
Published 2024“…<p>A model-based approach is developed for clustering categorical data with no natural ordering. …”
-
14
-
15
Algorithm process.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
16
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
17
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
18
-
19
Comparison of homomorphic encryption algorithms.
Published 2024“…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …”
-
20