[1] |
Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG.
Binary code identification based on user system call sequences
[J]. Journal of Computer Applications, 2024, 44(7): 2160-2167.
|
[2] |
Xinrui LIN, Xiaofei WANG, Yan ZHU.
Academic anomaly citation group detection based on local extended community detection
[J]. Journal of Computer Applications, 2024, 44(6): 1855-1861.
|
[3] |
Fan MENG, Qunli YANG, Jing HUO, Xinkuan WANG.
EraseMTS: iterative active multivariable time series anomaly detection algorithm based on margin anomaly candidate set
[J]. Journal of Computer Applications, 2024, 44(5): 1458-1463.
|
[4] |
Zimeng ZHU, Zhixin LI, Zhan HUAN, Ying CHEN, Jiuzhen LIANG.
Weakly supervised video anomaly detection based on triplet-centered guidance
[J]. Journal of Computer Applications, 2024, 44(5): 1452-1457.
|
[5] |
Yuning ZHANG, Abudukelimu ABULIZI, Tisheng MEI, Chun XU, Maierdana MAIMAITIREYIMU, Halidanmu ABUDUKELIMU, Yutao HOU.
Anomaly detection method for skeletal X-ray images based on self-supervised feature extraction
[J]. Journal of Computer Applications, 2024, 44(1): 175-181.
|
[6] |
Chaoshuai QI, Wensi HE, Yi JIAO, Yinghong MA, Wei CAI, Suping REN.
Survey on anomaly detection algorithms for unmanned aerial vehicle flight data
[J]. Journal of Computer Applications, 2023, 43(6): 1833-1841.
|
[7] |
Hao GAO, Qingke ZHANG, Xianglong BU, Junqing LI, Huaxiang ZHANG.
Teaching-learning-based optimization algorithm based on cooperative mutation and Lévy flight strategy and its application
[J]. Journal of Computer Applications, 2023, 43(5): 1355-1364.
|
[8] |
Zhe XU, Zhihong WANG, Cunyu SHAN, Yaru SUN, Ying YANG.
Unsupervised face forgery video detection based on reconstruction error
[J]. Journal of Computer Applications, 2023, 43(5): 1571-1577.
|
[9] |
Chunyong YIN, Liwen ZHOU.
Unsupervised time series anomaly detection model based on re-encoding
[J]. Journal of Computer Applications, 2023, 43(3): 804-811.
|
[10] |
Qing JIA, Laihua WANG, Weisheng WANG.
Anomaly detection in video via independently recurrent neural network and variational autoencoder network
[J]. Journal of Computer Applications, 2023, 43(2): 507-513.
|
[11] |
Anqin ZHANG, Xiaohui WANG.
Power battery safety warning based on time series anomaly detection
[J]. Journal of Computer Applications, 2023, 43(12): 3799-3805.
|
[12] |
Chunyong YIN, Yangchun ZHANG.
Unsupervised log anomaly detection model based on CNN and Bi-LSTM
[J]. Journal of Computer Applications, 2023, 43(11): 3510-3516.
|
[13] |
An YANG, Qun JIANG, Gang SUN, Jie YIN, Ying LIU.
Power data analysis based on financial technical indicators
[J]. Journal of Computer Applications, 2022, 42(3): 904-910.
|
[14] |
Jia XU, Jing LIU, Ge YU, Pin LYU, Panyuan YANG.
Review of peer grading technologies for online education
[J]. Journal of Computer Applications, 2022, 42(12): 3913-3923.
|
[15] |
Jingwei LEI, Peng YI, Xiang CHEN, Liang WANG, Ming MAO.
PDF document detection model based on system calls and data provenance
[J]. Journal of Computer Applications, 2022, 42(12): 3831-3840.
|