Retraction

Fuzzy integrated rough set theory situation feature extraction of network security

Citations (21)

21
Total Citations
0
Post-Retraction
21
Pre-Retraction
0
Same Day
A Novel Reseach on Network Security Situation Prediction based on Iteratively Optimized RBF-NN
Yuqin Wu, Congqi Shen, Shungen Xiao et al. (6 authors)
Research Square (Research Square)
Published: Dec 2024
108 days before retraction
A self-supervised feature fusion approach to situation assessment
Xin Li, Jia Wang, Lixu Sun et al. (4 authors)
Journal of Intelligent & Fuzzy Systems
Published: Dec 2024
118 days before retraction
Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation
Huan Wang, Xin Li
Journal of Cyber Security and Mobility Open Access
Published: Apr 2024
373 days before retraction
Application of Image Segmenting Technology Based on Fuzzy C-Means Algorithm in Competition Video Referee
Xu Yan
IEEE Access Open Access
Published: Jan 2024
5 citations
472 days before retraction
Abnormal State Warning System of Network Security Management based on KD Tree and KNN
Xiong Luo, Yongsheng Ma, Xiaojuan Dang et al. (4 authors)
Procedia Computer Science Open Access
Published: Jan 2024
1 citation
472 days before retraction
Design of Campus Network Security Intelligent Monitoring System Based on BP Algorithm
Yunling Sun, Kou Yanan
Unknown Journal
Published: Dec 2023
482 days before retraction
Application of PSO optimization algorithm in power communication network security situation prediction
Meng Xu, Xuewu Li, Shenghan Liu
Unknown Journal
Published: Oct 2023
555 days before retraction
Railroad freight service quality evaluation system based on a logistic regression model
Zheng Zhao
Applied Mathematics and Nonlinear Sciences Open Access
Published: Jun 2023
1 citation
674 days before retraction
Research on university laboratory network security based on Cloud Computing
Dan Li
Applied Mathematics and Nonlinear Sciences Open Access
Published: Jun 2023
685 days before retraction
An SSA-LC-DAE Method for Extracting Network Security Elements
Xiaoling Tao, Ziyi Liu, Feng Zhao et al. (7 authors)
IEEE Transactions on Network Science and Engineering
Published: Jan 2023
8 citations
832 days before retraction
An Algorithm for Network Security Situation Assessment Based on Deep Learning
Zhicheng Wen, Linhua Peng, Weiqing Wan et al. (4 authors)
International Journal of Pattern Recognition and Artificial Intelligence
Published: Jan 2023
835 days before retraction
Design of Network Data Information Security Monitoring System Based on Big Data Technology
Hui Gao
Procedia Computer Science Open Access
Published: Jan 2023
3 citations
837 days before retraction
Aviation and Airspace Management under Rough Set Theory
Yue Zhu, Ho Yin Kan
Mathematical Problems in Engineering Open Access
Published: Sep 2022
1 citation
950 days before retraction
Synchronous capture method of multi-channel weak signal in long-distance communication network
Yuanyuan Wang
Journal of Computational Methods in Sciences and Engineering
Published: Sep 2022
1 citation
958 days before retraction
Situation Element Extraction Based on Fuzzy Rough Set and Combination Classifier
Dongmei Zhao, Wang Hong-bin, Yaxing Wu
Computational Intelligence and Neuroscience Open Access
Published: Aug 2022
2 citations
968 days before retraction
Application of Data Encryption Technology in Network Information Security Sharing
Dongzhi Xu, Wenjuan Zheng
Security and Communication Networks Open Access
Published: Aug 2022
2 citations
970 days before retraction
Development and Construction of Internet of Things Training Practice Platform for Employment Skills Assessment
Xiaofeng Zhang
Journal of Sensors Open Access
Published: Aug 2022
3 citations
987 days before retraction
Uncertainty Optimization-Based Rough Set for Incomplete Information Systems
Arvind Kumar Sinha, Pradeep Shende
Mathematics and Statistics Open Access
Published: Jul 2022
3 citations
1021 days before retraction
A Sensing Method of Network Security Situation Based on Markov Game Model
Bingjie Lin, Jie Cheng, Chuncheng Wei et al. (4 authors)
International Journal of Circuits Systems and Signal Processing Open Access
Published: Jan 2022
1193 days before retraction
Application of nonlinear recursion equation in network security risk detection
Chunqiu Li
Nonlinear Engineering Open Access
Published: Jan 2022
1202 days before retraction
Research on Network Security Situation Awareness Based on the LSTM-DT Model
Haofang Zhang, Chunying Kang, Yao Xiao
Sensors Open Access
Published: Jul 2021
46 citations
1374 days before retraction
Quick Stats
Total Citations: 21
Years Since Retraction: <1 year
Open Access: Yes
Last Checked: Jul 23, 2025
Related Papers
Models for selecting an ERP system with hesitant fuzzy ling…
Journal of Intelligent & Fuzzy Systems • 140 citations
Fuzzy N-soft sets: A novel model with applications
Journal of Intelligent & Fuzzy Systems • 137 citations
Stochastic EDAS method for multi-criteria decision-making w…
Journal of Intelligent & Fuzzy Systems • 130 citations
Interval-valued dual hesitant fuzzy uncertain linguistic ag…
Journal of Intelligent & Fuzzy Systems • 106 citations
Hesitant fuzzy N-soft sets: A new model with applications i…
Journal of Intelligent & Fuzzy Systems • 90 citations