Open Access
Issue
JNWPU
Volume 42, Number 5, October 2024
Page(s) 882 - 890
DOI https://doi.org/10.1051/jnwpu/20244250882
Published online 06 December 2024
  1. ISHAQ M, AFZAL M H, TAHIR S, et al. A compact study of recent trends of challenges and opportunities in integrating internet of things(IOT) and cloud computing[C]//2021 International Conference on Computing, Electronic and Electrical Engineering, 2021: 1–4 [Google Scholar]
  2. CHEN Z, LI J, LI J, et al. GNSS multiparameter spoofing detection method based on support vector machine[J]. IEEE Sensors Journal, 2022, 22(18): 17864–17874. [Article] [CrossRef] [Google Scholar]
  3. LIU Y, ZHANG P, LI X. Physical layer authentication using mmwave channel state information[C]//2021 International Conference on Networking and Network Applications, 2021: 30–33 [Google Scholar]
  4. AFEEF L, FURQAN H M, ARSLAN H. Physical layer authentication scheme in beamspace MIMO systems[J]. IEEE Communications Letters, 2022, 26(7): 1484–1488. [Article] [CrossRef] [Google Scholar]
  5. FODOR G, PARKVALL S, SORRENTINO S, et al. Device-to-device communications for national security and public safety[J]. IEEE Access, 2014, 2: 1510–1520. [Article] [NASA ADS] [CrossRef] [Google Scholar]
  6. VAPNIK V N. An overview of statistical learning theory[J]. IEEE Trans on Neural Networks, 1999, 10(5): 988–999. [Article] [CrossRef] [Google Scholar]
  7. KAZEMI A, BOOSTANI R, ODEH M, et al. Two-layer SVM, towards deep statistical learning[C]//2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence, 2022: 1–6 [Google Scholar]
  8. YIN T, LI Y, FAN J, et al. A novel gated recurrent unit network based on svm and moth-flame optimization algorithm for behavior decision-making of autonomous vehicles[J]. IEEE Access, 2021, 9: 20410–20422. [Article] [CrossRef] [Google Scholar]
  9. GASCÓN-MORENO J, SALCEDO-SANZ S, ORTIZ-GARCÍA E G, et al. A binary-encoded tabu-list genetic algorithm for fast support vector regression hyper-parameters tuning[C]//Proceedings of the 2011 11th International Conference on Intelligent Systems Design and Applications, 2011: 1253–1257 [Google Scholar]
  10. CHEN C, XU X, WANG G, et al. Network intrusion detection model based on neural network feature extraction and PSO-SVM[C]//2022 7th International Conference on Intelligent Computing and Signal Processing, 2022: 1462–1465 [Google Scholar]
  11. WANG Z, JIANG Y, HU X, et al. A leaf type recognition algorithm based on SVM optimized by improved grid search method[C]//2020 5th International Conference on Electromechanical Control Technology and Transportation, 2020: 312–316 [Google Scholar]
  12. LI J, DING L, XING Y. Differential evolution based parameters selection for support vector machine[C]//2013 Ninth International Conference on Computational Intelligence and Security, 2013: 284–288 [Google Scholar]
  13. CHENG Y, LIU Z. Passive oppositional differential evolution for global optimization[C]//2019 11th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2019: 323–327 [Google Scholar]
  14. WANG P, YAN Z, ZENG K. Bcauth: physical layer enhanced authentication and attack tracing for backscatter communications[J]. IEEE Trans on Information Forensics and Security, 2022, 17: 2818–2834. [Article] [CrossRef] [Google Scholar]
  15. DAI C, YANG J, QIN Y, et al. Physical layer authentication algorithm based on SVM[C]//2016 2nd IEEE International Conference on Computer and Communications, 2016: 1597–1601 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.