Search alternatives:
selection algorithm » detection algorithms (Expand Search), prediction algorithms (Expand Search)
selection algorithm » detection algorithms (Expand Search), prediction algorithms (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
AUC scores of anomaly detection algorithms.
Published 2025“…Empirical evaluations conducted on multiple benchmark datasets demonstrate that the proposed method outperforms classical anomaly detection algorithms while surpassing conventional model averaging techniques based on minimizing standard loss functions. …”
-
9
Recall scores of anomaly detection algorithms.
Published 2025“…Empirical evaluations conducted on multiple benchmark datasets demonstrate that the proposed method outperforms classical anomaly detection algorithms while surpassing conventional model averaging techniques based on minimizing standard loss functions. …”
-
10
-
11
-
12
-
13
Comparison of defense capability of four algorithms against network intrusion.
Published 2025Subjects: -
14
F1-scores of anomaly detection algorithms.
Published 2025“…Empirical evaluations conducted on multiple benchmark datasets demonstrate that the proposed method outperforms classical anomaly detection algorithms while surpassing conventional model averaging techniques based on minimizing standard loss functions. …”
-
15
-
16
-
17
-
18
Overview of the Cell2Spatial algorithm.
Published 2025Subjects: “…minimizing assignment algorithm…”
-
19
Evaluation of model aggregation algorithms.
Published 2024“…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …”
-
20
Comparison of homomorphic encryption algorithms.
Published 2024“…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …”