| [1] | 
													
														Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG. 
														
															Binary code identification based on user system call sequences
														[J]. Journal of Computer Applications, 2024, 44(7): 2160-2167.
													 | 
												
																																																																																
													| [2] | 
													
														Xinrui LIN, Xiaofei WANG, Yan ZHU. 
														
															Academic anomaly citation group detection based on local extended community detection
														[J]. Journal of Computer Applications, 2024, 44(6): 1855-1861.
													 | 
												
																																																																																
													| [3] | 
													
														Fan MENG, Qunli YANG, Jing HUO, Xinkuan WANG. 
														
															EraseMTS: iterative active multivariable time series anomaly detection algorithm based on margin anomaly candidate set
														[J]. Journal of Computer Applications, 2024, 44(5): 1458-1463.
													 | 
												
																																																																																
													| [4] | 
													
														Zimeng ZHU, Zhixin LI, Zhan HUAN, Ying CHEN, Jiuzhen LIANG. 
														
															Weakly supervised video anomaly detection based on triplet-centered guidance
														[J]. Journal of Computer Applications, 2024, 44(5): 1452-1457.
													 | 
												
																																																																																
													| [5] | 
													
														Yuning ZHANG, Abudukelimu ABULIZI, Tisheng MEI, Chun XU, Maierdana MAIMAITIREYIMU, Halidanmu ABUDUKELIMU, Yutao HOU. 
														
															Anomaly detection method for skeletal X-ray images based on self-supervised feature extraction
														[J]. Journal of Computer Applications, 2024, 44(1): 175-181.
													 | 
												
																																																																																
													| [6] | 
													
														Chaoshuai QI, Wensi HE, Yi JIAO, Yinghong MA, Wei CAI, Suping REN. 
														
															Survey on anomaly detection algorithms for unmanned aerial vehicle flight data
														[J]. Journal of Computer Applications, 2023, 43(6): 1833-1841.
													 | 
												
																																																																																
													| [7] | 
													
														Hao GAO, Qingke ZHANG, Xianglong BU, Junqing LI, Huaxiang ZHANG. 
														
															Teaching-learning-based optimization algorithm based on cooperative mutation and Lévy flight strategy and its application
														[J]. Journal of Computer Applications, 2023, 43(5): 1355-1364.
													 | 
												
																																																																																
													| [8] | 
													
														Zhe XU, Zhihong WANG, Cunyu SHAN, Yaru SUN, Ying YANG. 
														
															Unsupervised face forgery video detection based on reconstruction error
														[J]. Journal of Computer Applications, 2023, 43(5): 1571-1577.
													 | 
												
																																																																																
													| [9] | 
													
														Chunyong YIN, Liwen ZHOU. 
														
															Unsupervised time series anomaly detection model based on re-encoding
														[J]. Journal of Computer Applications, 2023, 43(3): 804-811.
													 | 
												
																																																																																
													| [10] | 
													
														Qing JIA, Laihua WANG, Weisheng WANG. 
														
															Anomaly detection in video via independently recurrent neural network and variational autoencoder network
														[J]. Journal of Computer Applications, 2023, 43(2): 507-513.
													 | 
												
																																																																																
													| [11] | 
													
														Anqin ZHANG, Xiaohui WANG. 
														
															Power battery safety warning based on time series anomaly detection
														[J]. Journal of Computer Applications, 2023, 43(12): 3799-3805.
													 | 
												
																																																																																
													| [12] | 
													
														Chunyong YIN, Yangchun ZHANG. 
														
															Unsupervised log anomaly detection model based on CNN and Bi-LSTM
														[J]. Journal of Computer Applications, 2023, 43(11): 3510-3516.
													 | 
												
																																																																																
													| [13] | 
													
														An YANG, Qun JIANG, Gang SUN, Jie YIN, Ying LIU. 
														
															Power data analysis based on financial technical indicators
														[J]. Journal of Computer Applications, 2022, 42(3): 904-910.
													 | 
												
																																																																																
													| [14] | 
													
														Jia XU, Jing LIU, Ge YU, Pin LYU, Panyuan YANG. 
														
															Review of peer grading technologies for online education
														[J]. Journal of Computer Applications, 2022, 42(12): 3913-3923.
													 | 
												
																																																																																
													| [15] | 
													
														Jingwei LEI, Peng YI, Xiang CHEN, Liang WANG, Ming MAO. 
														
															PDF document detection model based on system calls and data provenance
														[J]. Journal of Computer Applications, 2022, 42(12): 3831-3840.
													 |