[1] X. S. Wei, J. H. Luo,J. Wu, “Selective Convolutional Descriptor Aggregation for Fine-Grained Image Retrieval,” IEEE Transactions on Image Processing, Vol. 26, No. 6, pp. 2868-2881, 2017 [2] A. S. Razavian, J. Sullivan,S. Carlsson, “Visual Instance Retrieval with Deep Convolutional Networks,” ITE Transactions on Media Technology and Applications, Vol. 4, No. 3, pp. 251-258, 2016 [3] N. Saxena, S. Grijalva, V. Chukwuka,A. Vasilakos, “Network Security and Privacy Challenges in Smart Vehicle-to-Grid,” IEEE Wireless Communications, Vol. 12, No. 99, pp. 2-12, 2017 [4] H. Guo, H. Liu, C. Wu, et al., “Logistic Discrimination based on G-Mean and F-Measure for Imbalanced Problem,” Journal of Intelligent and Fuzzy Systems, Vol. 31, No. 3, pp. 1155-1166, 2016 [5] S. Ijaz, F. A. Hashmi, S. Asghar,M. Alam, “Vector based Genetic Algorithm to Optimize Predictive Analysis in Network Security,” Applied Intelligence, Vol. 48, No. 2, pp. 1-11, 2017 [6] Y. Lin, X. Zhu, Z. Zheng, Z. Dou,R. L. Zhu, “The Individual Identification Method of Wireless Device based on Dimensionality Reduction and Machine Learning,” Journal of Supercomputing, Vol. 75, No. 6, pp. 3010-3027, 2019 [7] Y. Lin, C. Wang, J. X. Wang,Z. Dou, “A Novel Dynamic Spectrum Access Framework based on Reinforcement Learning for Cognitive Radio Sensor Networks,” Sensors, Vol. 16, No. 10, pp. 1675, 2016 [8] S. Liu, “Introduction of Key Problems in Long-Distance Learning and Training,” Mobile Networks and Applications, Vol. 24, No. 1, pp. 1-4, 2019 [9] C. L. Ma, H. Shan,T. Ma, “Improved Density Peaks based Clustering Algorithm with Strategy Choosing Cluster Center Automatically,” Computer Science, Vol. 43, No. 7, pp. 255-258, 2016 [10] S. B.Zhou and W. X. Xu, “A Novel Clustering Algorithm based on Relative Density and Decision Graph,” Control and Decision, Vol. 33, No. 11, pp. 1921-1930, 2018 [11] H. He and Y. Tan, “Automatic Pattern Recognition of ECG Signals using Entropy-based Adaptive Dimensionality Reduction and Clustering,” Applied Soft Computing, Vol. 55, No. 12, pp. 238-252, 2017 [12] J. H. Park, Y. Sung, P. K. Sharma, et al., “Novel Assessment Method for Accessing Private Data in Social Network Security Services,” Journal of Supercomputing, Vol. 73, No. 3, pp. 1-19, 2017 [13] H. S. Gill, S. S. Gill,K. S. Bhatia, “A Novel Approach for Physical Layer Security in Future-Generation Passive Optical Networks,” Photonic Network Communications, Vol. 35, No. 11, pp. 1-10, 2017 [14] D. He, S. Chan,M. Guizani, “Win-Win Security Approaches for Smart Grid Communications Networks,” IEEE Network, Vol. 31, No. 6, pp. 12-18, 2017 [15] S. Gao, Z. C. Li, B. Xiao,G. Y. Wei, “Security Threats in the Data Plane of Software-Defined Networks,” IEEE Network, Vol. 32, No. 4, pp. 108-113, 2018 [16] Y. L. Li, N. Hua, Y. F. Yu, Q. S. Luo,X. P. Zheng, “Light Source and Trail Recognition via Optical Spectrum Feature Analysis for Optical Network Security,” IEEE Communications Letters, Vol. 5, No. 99, pp. 1, 2018 [17] D. J. He, X. R. Li, S. Chan, J. H. Gao,M. Guizani, “Security Analysis of a Space-based Wireless Network,” IEEE Network, Vol. 33, No. 1, pp. 36-43, 2018 [18] Q. Wang, X. F. Gong,R. S. Luo, “Coherent Sources Number Estimation based on Circular Array Virtual Array Translation,” Computer Engineering, Vol. 44, No. 9, pp. 78-82, 2018 [19] S. Liu, Z. J. Li,X. C. Cheng, “Introduction of Recent Advanced Hybrid Information Processing,” Mobile Networks and Applications, Vol. 23, No. 4, pp. 673-676, 2018 |