[1] |
ZHANG Yang, JIANG Minghu.
Authorship identification of text based on attention mechanism
[J]. Journal of Computer Applications, 2021, 41(7): 1897-1901.
|
[2] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[3] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[4] |
YANG Ling, JIANG Chunmao.
Strategy of energy-aware virtual machine migration based on three-way decision
[J]. Journal of Computer Applications, 2021, 41(4): 990-998.
|
[5] |
XIE Wenbo, WEI Yongzhuang, LIU Zhenghong.
Parallel implementation and analysis of SKINNY encryption algorithm using CUDA
[J]. Journal of Computer Applications, 2021, 41(4): 1136-1141.
|
[6] |
YANG Xianfeng, GUI Hongjun, FU Chunchang.
F-X domain predictive filtering parallel algorithm based on compute unified device architecture
[J]. Journal of Computer Applications, 2021, 41(2): 486-491.
|
[7] |
WEN Chaodong, ZENG Cheng, REN Junwei, ZHANG Yan.
Patent text classification based on ALBERT and bidirectional gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(2): 407-412.
|
[8] |
Yang ZHANG, Xiaoning WANG.
Text feature selection method based on Word2Vec word embedding and genetic algorithm for biomarker selection in high-dimensional omics
[J]. Journal of Computer Applications, 2021, 41(11): 3151-3155.
|
[9] |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN.
Searchable encryption scheme based on splittable inverted index
[J]. Journal of Computer Applications, 2021, 41(11): 3288-3294.
|
[10] |
YIN Chunyong, HE Miao.
Text classification based on improved capsule network
[J]. Journal of Computer Applications, 2020, 40(9): 2525-2530.
|
[11] |
LIAO Shenglan, YIN Shi, CHEN Xiaoping, ZHANG Bo, OUYANG Yu, ZHANG Heng.
Intent recognition dataset for dialogue systems in power business
[J]. Journal of Computer Applications, 2020, 40(9): 2549-2554.
|
[12] |
LYU Jiayu, ZHU Zhirong, YAO Zhiqiang.
Two-channel dynamic data encryption strategy in cloud computing environment
[J]. Journal of Computer Applications, 2020, 40(8): 2268-2273.
|
[13] |
WANG Minrui, GAO Shu, YUAN Ziyong, YUAN Lei.
Sequence generation model with dynamic routing for multi-label text classification
[J]. Journal of Computer Applications, 2020, 40(7): 1884-1890.
|
[14] |
LI Ming, GUO Chenhao, CHEN Xing.
Automatic annotation of visual deep neural network
[J]. Journal of Computer Applications, 2020, 40(6): 1593-1600.
|
[15] |
CHEN Chengjun, MAO Yingchi, WANG Yichao.
CNN model compression based on activation-entropy based layer-wise iterative pruning strategy
[J]. Journal of Computer Applications, 2020, 40(5): 1260-1265.
|