[1] |
GAO Gong, YANG Hongyu, LIU Hong.
3D point cloud face recognition based on deep learning
[J]. Journal of Computer Applications, 2021, 41(9): 2736-2740.
|
[2] |
LI Xingfeng, HUANG Yuqing, REN Zhenwen, LI Yihong.
Robust multi-view clustering algorithm based on adaptive neighborhood
[J]. Journal of Computer Applications, 2021, 41(4): 1093-1099.
|
[3] |
PEI Yiyao, GUO Huiming, ZHANG Danpu, CHEN Wenbo.
Robust 3D object detection method based on localization uncertainty
[J]. Journal of Computer Applications, 2021, 41(10): 2979-2984.
|
[4] |
WANG Benjie, NONG Liping, ZHANG Wenhui, LIN Jiming, WANG Junyi.
3D point cloud classification and segmentation network based on Spider convolution
[J]. Journal of Computer Applications, 2020, 40(6): 1607-1612.
|
[5] |
XING Zhiwei, QIAO Di, LIU Hong’en, GAO Zhiwei, LUO Xiao, LUO Qian.
Optimization method of airport gate assignment based on relaxation algorithm
[J]. Journal of Computer Applications, 2020, 40(6): 1850-1855.
|
[6] |
HUANG Guangqiu, XIE Rong.
Cascading failure model of carbon emission spatial correlation system considering load overload
[J]. Journal of Computer Applications, 2019, 39(6): 1829-1835.
|
[7] |
LAI Jie, WANG Xiaodan, LI Rui, ZHAO Zhenchong.
Denoising autoencoder based extreme learning machine
[J]. Journal of Computer Applications, 2019, 39(6): 1619-1625.
|
[8] |
YU Jianglan, LI Xiangli, ZHAO Pengfei.
Sparse non-negative matrix factorization based on kernel and hypergraph regularization
[J]. Journal of Computer Applications, 2019, 39(3): 742-749.
|
[9] |
LIU Weibo, ZENG Qingning, BU Yuting, ZHENG Zhanheng.
Speech recognition method based on dual micro-array and convolutional neural network
[J]. Journal of Computer Applications, 2019, 39(11): 3268-3273.
|
[10] |
WANG Yan, LYU Meng, MENG Xiangfu, LI Yuhao.
Image matching method with illumination robustness
[J]. Journal of Computer Applications, 2019, 39(1): 262-266.
|
[11] |
CHEN Ping, GONG Xun.
Face alignment method based on scale self-adaption and incremental learning
[J]. Journal of Computer Applications, 2018, 38(7): 2064-2069.
|
[12] |
CAO Jingjing, XU Jieping, SHAO Shengqi.
Hierarchical speech recognition model in multi-noise environment
[J]. Journal of Computer Applications, 2018, 38(6): 1790-1794.
|
[13] |
DAI Xiaokang, CHEN Changbo, WU Wenyuan.
New voting protocol based on homomorphic threshold cryptography
[J]. Journal of Computer Applications, 2018, 38(4): 1036-1040.
|
[14] |
JIANG Maosong, WANG Dongxia, NIU Fanglin, CAO Yudong.
Speech enhancement method based on sparsity-regularized non-negative matrix factorization
[J]. Journal of Computer Applications, 2018, 38(4): 1176-1180.
|
[15] |
ZHANG Chunyan, LI Jingbing, WANG Shuangshuang.
Encrypted image retrieval algorithm based on discrete wavelet transform and perceptual hash
[J]. Journal of Computer Applications, 2018, 38(2): 539-544.
|