Figure - available from: The Journal of Supercomputing
This content is subject to copyright. Terms and conditions apply.
The impact of hidden layer node selection on ELM. a ELM without hidden layer node selection. b ELM with hidden layer node selection

The impact of hidden layer node selection on ELM. a ELM without hidden layer node selection. b ELM with hidden layer node selection

Source publication
Article
Full-text available
Ensuring a secure online environment hinges on the timely detection of network attacks. Nevertheless, existing detection methods often grapple with the delicate balance between speed and accuracy. In this paper, we introduce a novel intrusion detection algorithm that marries quantum particle swarm optimization with an extreme learning machine (QPSO...

Similar publications

Preprint
Full-text available
Aiming at the intrusion detection model, there are problems such as single dimension of local feature extraction, prediction accuracy to be improved and high computational overhead of the model, an intrusion detection model based on Dilated Convolution Network (DCN) and Bidirectional Long Short Memory Network (BiLSTM) intrusion detection model. Fir...