no code implementations • 11 Aug 2020 • Mubarak Albarka Umar, Chen Zhanfang, Yan Liu
We evaluate the effectiveness of our propose method by comparing it with the baseline models and also with state-of-the-art works.
feature selection Network Intrusion Detection