Open Access
ARTICLE
Guorong Cui, Hao Li, Yachuan Zhang, Rongjing Bu, Yan Kang*, Jinyuan Li, Yang Hu
Journal of Quantum Computing, Vol.2, No.2, pp. 85-95, 2020, DOI:10.32604/jqc.2020.09717
Abstract The traditional K-means clustering algorithm is difficult to determine
the cluster number, which is sensitive to the initialization of the clustering center
and easy to fall into local optimum. This paper proposes a clustering algorithm
based on self-organizing mapping network and weight particle swarm
optimization SOM&WPSO (Self-Organization Map and Weight Particle Swarm
Optimization). Firstly, the algorithm takes the competitive learning mechanism
of a self-organizing mapping network to divide the data samples into coarse
clusters and obtain the clustering center. Then, the obtained clustering center is
used as the initialization parameter of the weight particle swarm optimization
algorithm. The particle position… More >
Open Access
ARTICLE
Xinda Hao1, Jianmin Zhou2,*, Xueqi Shen1, Yu Yang1
Journal of Quantum Computing, Vol.2, No.2, pp. 97-104, 2020, DOI:10.32604/jqc.2020.010819
Abstract In recent years, machine learning technology has been widely used for
timely network attack detection and classification. However, due to the large
number of network traffic and the complex and variable nature of malicious
attacks, many challenges have arisen in the field of network intrusion detection.
Aiming at the problem that massive and high-dimensional data in cloud
computing networks will have a negative impact on anomaly detection, this
paper proposes a Bi-LSTM method based on attention mechanism, which learns
by transmitting IDS data to multiple hidden layers. Abstract information and
high-dimensional feature representation in network data messages are used to… More >
Open Access
ARTICLE
Wangdong Jiang1, Jie Wu1,*, Guang Sun1,2, Yuxin Ouyang3, Jing Li3, Shuang Zhou2
Journal of Quantum Computing, Vol.2, No.2, pp. 105-117, 2020, DOI:10.32604/jqc.2020.07242
Abstract In the era of big data, the general public is more likely to access big
data, but they wouldn’t like to analyze the data. Therefore, the traditional data
visualization with certain professionalism is not easy to be accepted by the
general public living in the fast pace. Under this background, a new general
visualization method for dynamic time series data emerges as the times require.
Time series data visualization organizes abstract and hard-to-understand data
into a form that is easily understood by the public. This method integrates data
visualization into short videos, which is more in line with the way… More >
Open Access
ARTICLE
Ping Lu1,2,*
Journal of Quantum Computing, Vol.2, No.2, pp. 119-127, 2020, DOI:10.32604/jqc.2020.09433
Abstract In recent years, with the maturity and popularity of Wi-Fi technology,
wireless hotspots have been deployed on a large scale in public places. But at the
same time, it brings many security issues that cannot be ignored. Among them, the
fake access point attack is a very serious threat in wireless local area network. In
this paper, we propose a method to detect fake access points in wireless local area
network. First, our detection method is passive, which means there is almost no
additional traffic will be generated during the program’s operation. Second,
different from many existing methods, our method… More >