[1] |
ZHANG Cheng, WAN Yuan, QIANG Haopeng.
Deep unsupervised discrete cross-modal hashing based on knowledge distillation
[J]. Journal of Computer Applications, 2021, 41(9): 2523-2531.
|
[2] |
ZHOU Xianbing, FAN Xiaochao, REN Ge, YANG Yong.
Automated English essay scoring method based on multi-level semantic features
[J]. Journal of Computer Applications, 2021, 41(8): 2205-2211.
|
[3] |
LIU Fangming, ZHANG Hong.
Cross-modal retrieval algorithm based on multi-level semantic discriminative guided hashing
[J]. Journal of Computer Applications, 2021, 41(8): 2187-2192.
|
[4] |
YANG Su, OUYANG Zhi, DU Nisuo.
Unsupervised parallel hash image retrieval based on correlation distance
[J]. Journal of Computer Applications, 2021, 41(7): 1902-1907.
|
[5] |
WU Yue, LUO Jiangtao, LIU Rui, HU Zhongyin.
Video similarity detection method based on perceptual hashing and dicing
[J]. Journal of Computer Applications, 2021, 41(7): 2070-2075.
|
[6] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[7] |
GUO Yicun, CHEN Huahui.
Survey on online hashing algorithm
[J]. Journal of Computer Applications, 2021, 41(4): 1106-1112.
|
[8] |
TANG Chen, HUANG Guorui, JIN Peiquan.
NVM-LH: non-volatile memory-friendly linear hash index
[J]. Journal of Computer Applications, 2021, 41(3): 623-629.
|
[9] |
JIANG Qianyu, WANG Fengying, JIA Lipeng.
Malware detection method based on perceptual hash algorithm and feature fusion
[J]. Journal of Computer Applications, 2021, 41(3): 780-785.
|
[10] |
LI Mingwei, JIANG Qingyuan, XIE Yinpeng, HE Jindong, WU Dan.
Hash learning based malicious SQL detection
[J]. Journal of Computer Applications, 2021, 41(1): 121-126.
|
[11] |
LYU Ruimin, MEI Lilin, XING Hongcha, MENG Lei, ZE Yuefeng.
Sequentiality perception quantification method of painting and calligraphy based on Markov chain
[J]. Journal of Computer Applications, 2021, 41(1): 295-299.
|
[12] |
WANG Cheng, YE Baoliu, MEI Feng, LU Wenda.
High performance key-value storage system based on remote direct memory access
[J]. Journal of Computer Applications, 2020, 40(2): 316-320.
|
[13] |
LI Zhen, YAO Hanbing, MU Yicheng.
Secure ranked search scheme based on Simhash over encrypted data
[J]. Journal of Computer Applications, 2019, 39(9): 2623-2628.
|
[14] |
TANG Linchuan, DENG Siyu, WU Yanxue, WEN Liuying.
Duplicate detection algorithm for massive images based on pHash block detection
[J]. Journal of Computer Applications, 2019, 39(9): 2789-2794.
|
[15] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|