Search alternatives:
comparing optimization » competing optimization (Expand Search), compared optimization (Expand Search), learning optimization (Expand Search)
based optimization » whale optimization (Expand Search)
data comparing » data comparison (Expand Search), data accompanying (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
case based » made based (Expand Search), game based (Expand Search), rate based (Expand Search)
comparing optimization » competing optimization (Expand Search), compared optimization (Expand Search), learning optimization (Expand Search)
based optimization » whale optimization (Expand Search)
data comparing » data comparison (Expand Search), data accompanying (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
case based » made based (Expand Search), game based (Expand Search), rate based (Expand Search)
-
1
-
2
-
3
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Medium-scale dataset comparative analysis using the number of features selected.
Published 2023Subjects: -
17
Large-scale dataset comparative analysis using the number of features selected.
Published 2023Subjects: -
18
Small-scale dataset comparative analysis using the number of features selected.
Published 2023Subjects: -
19
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
20