Search alternatives:
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search)
design optimization » bayesian optimization (Expand Search)
sample selection » sample collection (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
case sample » case samples (Expand Search), based sample (Expand Search), case example (Expand Search)
case design » based design (Expand Search), game design (Expand Search), core design (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search)
design optimization » bayesian optimization (Expand Search)
sample selection » sample collection (Expand Search)
binary case » binary mask (Expand Search), binary image (Expand Search), primary case (Expand Search)
case sample » case samples (Expand Search), based sample (Expand Search), case example (Expand Search)
case design » based design (Expand Search), game design (Expand Search), core design (Expand Search)
-
1
-
2
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
3
-
4
-
5
-
6
-
7
An Extension of the Unified Skew-Normal Family of Distributions and its Application to Bayesian Binary Regression
Published 2024“…We discuss in detail the popular logit case, and we show that, when a logistic regression model is combined with a Gaussian prior, posterior summaries such as cumulants and normalizing constants can easily be obtained through the use of an importance sampling approach, opening the way to straightforward variable selection procedures. …”
-
8
-
9
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
10
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
11
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
12
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
13
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
14
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
15
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
16
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
17
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
18
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
19
Causal Inference Under Outcome-Based Sampling with Monotonicity Assumptions
Published 2023“…<p>We study causal inference under case-control and case-population sampling. Specifically, we focus on the binary-outcome and binary-treatment case, where the parameters of interest are causal relative and attributable risks defined via the potential outcome framework. …”
-
20
Table 1_Provider fidelity in tuberculosis screening practices among adolescents and adults living with HIV in public health facilities in Tanzania: a cross-sectional evaluation.doc...
Published 2025“…Simple random and systematic sampling methods were employed to select the records and sessions, respectively. …”