Search alternatives:
weighted optimization » weight optimization (Expand Search), weighted estimation (Expand Search), guided optimization (Expand Search)
i optimization » _ optimization (Expand Search), acid optimization (Expand Search), fox optimization (Expand Search)
class weighted » class weight (Expand Search), class weights (Expand Search), class weighting (Expand Search)
class i » class ii (Expand Search), class c (Expand Search), class _ (Expand Search)
weighted optimization » weight optimization (Expand Search), weighted estimation (Expand Search), guided optimization (Expand Search)
i optimization » _ optimization (Expand Search), acid optimization (Expand Search), fox optimization (Expand Search)
class weighted » class weight (Expand Search), class weights (Expand Search), class weighting (Expand Search)
class i » class ii (Expand Search), class c (Expand Search), class _ (Expand Search)
-
1
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
2
-
3
<i>hi</i>PRS algorithm process flow.
Published 2023“…<b>(B)</b> Focusing on the positive class only, the algorithm exploits FIM (<i>apriori</i> algorithm) to build a list of candidate interactions of any desired order, retaining those that have an empirical frequency above a given threshold <i>δ</i>. …”
-
4
-
5
-
6
-
7
-
8
-
9
-
10
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Hence, Binary Black Widow Optimization Algorithm (BBWOA) is proposed in this manuscript to improve the BRBPNN classifier that detects intrusion precisely. …”
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
Summary of LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
19
SHAP analysis for LITNET-2020 dataset.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
20
Comparison of intrusion detection systems.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”