《计算机应用》唯一官方网站 ›› 2026, Vol. 46 ›› Issue (2): 475-484.DOI: 10.11772/j.issn.1001-9081.2025020204
• 网络空间安全 • 上一篇
李名1,2, 王孟齐1(
), 张爱丽1,2, 任花1,2, 窦育强1,2
收稿日期:2025-03-06
修回日期:2025-04-07
接受日期:2025-04-18
发布日期:2025-04-24
出版日期:2026-02-10
通讯作者:
王孟齐
作者简介:李名(1981—),男,河南新乡人,副教授,博士,主要研究方向:信息隐藏、图像加密、对抗样本基金资助:
Ming LI1,2, Mengqi WANG1(
), Aili ZHANG1,2, Hua REN1,2, Yuqiang DOU1,2
Received:2025-03-06
Revised:2025-04-07
Accepted:2025-04-18
Online:2025-04-24
Published:2026-02-10
Contact:
Mengqi WANG
About author:LI Ming, born in 1981, Ph. D., associate professor. His research interests include information hiding, image encryption, adversarial examples.Supported by:摘要:
目前以图藏图的深度隐写术存在隐写图像安全性不强以及恢复的秘密图像中存在图像失真的问题,难以实际应用于隐私保护和秘密通信。针对以上问题,提出一种基于条件生成对抗网络和混合注意力机制的以图藏图隐写方法(CBAM-CGAN)。首先,在生成器网络中引入混合注意模块,帮助生成器从通道和空间维度全面地学习图像特征,提高隐写图像的视觉质量;其次,引入残差连接降低网络学习过程中秘密图像的特征损失,并通过提取器和判别器的对抗训练,实现秘密图像的无噪声提取;最后,通过生成器和隐写分析器的对抗训练,提高隐写图像的安全性。在COCO等公开数据集上的实验结果显示,与StegGAN隐写方法相比,所提隐写方法的隐写图像和解密图像的峰值信噪比(PSNR)分别提高了4.37 dB和4.71 dB,结构相似性(SSIM)分别提高了9.16%和6.46%。在安全性方面,所提方法面对隐写分析器Ye-Net的检测,检测准确率(Acc)降低了9.35个百分点,误检率(FNR)提升了12.01个百分点。可见,所提方法在保证隐写图像安全性的同时能高质量地恢复秘密图像。
中图分类号:
李名, 王孟齐, 张爱丽, 任花, 窦育强. 基于条件生成对抗网络和混合注意力机制的图像隐写方法[J]. 计算机应用, 2026, 46(2): 475-484.
Ming LI, Mengqi WANG, Aili ZHANG, Hua REN, Yuqiang DOU. Image steganography method based on conditional generative adversarial networks and hybrid attention mechanism[J]. Journal of Computer Applications, 2026, 46(2): 475-484.
| 方法 | 图像对 | SSIM/% | PSNR/dB | MS-SSIM | VIF | UQI |
|---|---|---|---|---|---|---|
| NIPS-17[ | C, S | 0.848 1 | 31.509 0 | 0.951 9 | 0.564 5 | 0.952 3 |
| M, M´ | 0.758 1 | 31.485 5 | 0.683 6 | 0.785 7 | 0.921 1 | |
| DAH-Net[ | C, S | 0.800 3 | 32.279 9 | 0.895 3 | 0.803 6 | 0.965 0 |
| M, M´ | 0.788 3 | 30.559 4 | 0.798 6 | 0.752 6 | 0.929 6 | |
| StegGAN[ | C, S | 0.910 1 | 36.210 9 | 0.978 0 | 0.835 9 | 0.983 1 |
| M, M´ | 0.902 8 | 31.923 5 | 0.954 2 | 0.661 2 | 0.937 6 | |
| CBAM-CGAN | C, S | 0.993 5 | 40.582 6 | 0.995 6 | 0.872 5 | 0.995 6 |
| M, M´ | 0.961 2 | 36.632 7 | 0.979 6 | 0.776 4 | 0.975 6 |
表1 所提方法与NIPS-17、DAH-Net和StegGAN的性能比较
Tab. 1 Comparison of proposed method with NIPS-17, DAH-Net, and StegGAN
| 方法 | 图像对 | SSIM/% | PSNR/dB | MS-SSIM | VIF | UQI |
|---|---|---|---|---|---|---|
| NIPS-17[ | C, S | 0.848 1 | 31.509 0 | 0.951 9 | 0.564 5 | 0.952 3 |
| M, M´ | 0.758 1 | 31.485 5 | 0.683 6 | 0.785 7 | 0.921 1 | |
| DAH-Net[ | C, S | 0.800 3 | 32.279 9 | 0.895 3 | 0.803 6 | 0.965 0 |
| M, M´ | 0.788 3 | 30.559 4 | 0.798 6 | 0.752 6 | 0.929 6 | |
| StegGAN[ | C, S | 0.910 1 | 36.210 9 | 0.978 0 | 0.835 9 | 0.983 1 |
| M, M´ | 0.902 8 | 31.923 5 | 0.954 2 | 0.661 2 | 0.937 6 | |
| CBAM-CGAN | C, S | 0.993 5 | 40.582 6 | 0.995 6 | 0.872 5 | 0.995 6 |
| M, M´ | 0.961 2 | 36.632 7 | 0.979 6 | 0.776 4 | 0.975 6 |
| 隐写方法 | 封面图像和隐写图像 | 秘密图像和提取图像 | ||
|---|---|---|---|---|
| PSNR/dB | SSIM | PSNR/dB | SSIM | |
| CBAM-CGAN | 40.58 | 0.993 5 | 36.63 | 0.961 2 |
| 对照组1 | 34.67 | 0.920 6 | 36.28 | 0.941 6 |
| 对照组2 | 33.88 | 0.917 9 | 36.68 | 0.940 5 |
| 对照组3 | 39.59 | 0.976 9 | 31.68 | 0.901 7 |
表2 消融实验中的PSNR和SSIM比较
Tab. 2 Comparison of PSNR and SSIM in ablation experiments
| 隐写方法 | 封面图像和隐写图像 | 秘密图像和提取图像 | ||
|---|---|---|---|---|
| PSNR/dB | SSIM | PSNR/dB | SSIM | |
| CBAM-CGAN | 40.58 | 0.993 5 | 36.63 | 0.961 2 |
| 对照组1 | 34.67 | 0.920 6 | 36.28 | 0.941 6 |
| 对照组2 | 33.88 | 0.917 9 | 36.68 | 0.940 5 |
| 对照组3 | 39.59 | 0.976 9 | 31.68 | 0.901 7 |
| 隐写方法 | Ye-Net[ | SR-Net[ | Zhu-Net[ | |||
|---|---|---|---|---|---|---|
| Acc | FNR/% | Acc | FNR/% | Acc | FNR/% | |
| CBAM-CGAN | 0.518 9 | 42.52 | 0.512 1 | 40.61 | 0.520 6 | 41.57 |
| 文献[ | 0.581 6 | 32.58 | 0.591 5 | 27.89 | 0.567 1 | 29.05 |
| StegGAN[ | 0.612 4 | 30.51 | 0.620 1 | 28.45 | 0.581 6 | 30.15 |
| 对照组1 | 0.692 3 | 10.25 | 0.694 2 | 12.74 | 0.719 4 | 13.06 |
| 对照组2 | 0.640 2 | 12.51 | 0.571 8 | 11.52 | 0.543 1 | 11.46 |
表3 隐写分析检测
Tab. 3 Steganalysis detection
| 隐写方法 | Ye-Net[ | SR-Net[ | Zhu-Net[ | |||
|---|---|---|---|---|---|---|
| Acc | FNR/% | Acc | FNR/% | Acc | FNR/% | |
| CBAM-CGAN | 0.518 9 | 42.52 | 0.512 1 | 40.61 | 0.520 6 | 41.57 |
| 文献[ | 0.581 6 | 32.58 | 0.591 5 | 27.89 | 0.567 1 | 29.05 |
| StegGAN[ | 0.612 4 | 30.51 | 0.620 1 | 28.45 | 0.581 6 | 30.15 |
| 对照组1 | 0.692 3 | 10.25 | 0.694 2 | 12.74 | 0.719 4 | 13.06 |
| 对照组2 | 0.640 2 | 12.51 | 0.571 8 | 11.52 | 0.543 1 | 11.46 |
| 隐写方法 | 图像对 | DIV2K | ImageNet | SIPI | |||
|---|---|---|---|---|---|---|---|
| SSIM | PSNR/dB | SSIM | PSNR/dB | SSIM | PSNR/dB | ||
| NIPS-17[ | C, S | 0.803 6 | 28.541 8 | 0.832 4 | 30.025 1 | 0.816 3 | 29.059 1 |
| M, M' | 0.709 7 | 29.346 1 | 0.725 1 | 28.612 5 | 0.740 2 | 27.034 1 | |
| DAH-Net[ | C, S | 0.793 1 | 31.025 8 | 0.775 1 | 30.204 7 | 0.759 1 | 29.047 2 |
| M, M' | 0.753 1 | 28.215 2 | 0.736 2 | 27.810 4 | 0.739 1 | 29.452 1 | |
| StegGAN[ | C, S | 0.872 8 | 34.128 7 | 0.882 1 | 32.621 7 | 0.851 4 | 33.512 7 |
| M, M' | 0.815 6 | 30.013 5 | 0.873 3 | 29.865 4 | 0.835 4 | 30.594 2 | |
| CBAM-CGAN | C, S | 0.953 1 | 36.218 5 | 0.943 6 | 37.021 9 | 0.946 1 | 36.015 4 |
| M, M' | 0.923 6 | 34.598 7 | 0.932 1 | 35.237 1 | 0.924 6 | 35.651 3 | |
表4 所提方法与NIPS-17[15]、DAH-Net[22]和StegGAN[23]的泛化能力比较
Tab. 4 Comparison of generalization ability of proposed method with NIPS-17[15], DAH-Net[22], and StegGAN[23]
| 隐写方法 | 图像对 | DIV2K | ImageNet | SIPI | |||
|---|---|---|---|---|---|---|---|
| SSIM | PSNR/dB | SSIM | PSNR/dB | SSIM | PSNR/dB | ||
| NIPS-17[ | C, S | 0.803 6 | 28.541 8 | 0.832 4 | 30.025 1 | 0.816 3 | 29.059 1 |
| M, M' | 0.709 7 | 29.346 1 | 0.725 1 | 28.612 5 | 0.740 2 | 27.034 1 | |
| DAH-Net[ | C, S | 0.793 1 | 31.025 8 | 0.775 1 | 30.204 7 | 0.759 1 | 29.047 2 |
| M, M' | 0.753 1 | 28.215 2 | 0.736 2 | 27.810 4 | 0.739 1 | 29.452 1 | |
| StegGAN[ | C, S | 0.872 8 | 34.128 7 | 0.882 1 | 32.621 7 | 0.851 4 | 33.512 7 |
| M, M' | 0.815 6 | 30.013 5 | 0.873 3 | 29.865 4 | 0.835 4 | 30.594 2 | |
| CBAM-CGAN | C, S | 0.953 1 | 36.218 5 | 0.943 6 | 37.021 9 | 0.946 1 | 36.015 4 |
| M, M' | 0.923 6 | 34.598 7 | 0.932 1 | 35.237 1 | 0.924 6 | 35.651 3 | |
| 攻击类型 | 所提方法 | 文献[ | 文献[ | |||
|---|---|---|---|---|---|---|
| PSNR/dB | SSIM | PSNR/dB | SSIM | PSNR/dB | SSIM | |
| 平均 | 37.1 | 0.935 5 | 29.8 | 0.829 5 | 30.0 | 0.796 1 |
| Salt and pepper | 38.5 | 0.961 2 | 31.8 | 0.875 7 | 30.9 | 0.850 8 |
| Poisson | 36.7 | 0.946 5 | 34.1 | 0.853 4 | 32.1 | 0.875 7 |
| Speckle | 37.2 | 0.958 3 | 30.5 | 0.822 8 | 30.8 | 0.835 2 |
| Average filter | 35.9 | 0.924 1 | 28.3 | 0.876 7 | 28.4 | 0.828 1 |
| Cropping(25%) | 34.1 | 0.919 5 | 26.7 | 0.793 3 | 26.2 | 0.716 5 |
| Cropping(50%) | 32.6 | 0.901 8 | 24.8 | 0.777 2 | 30.1 | 0.694 8 |
| Resize(50%) | 36.4 | 0.923 2 | 28.9 | 0.804 6 | 32.5 | 0.779 4 |
| Gaussian noise | 37.8 | 0.937 6 | 30.1 | 0.821 8 | 31.7 | 0.828 5 |
| JPEG Compression(QF=50) | 35.3 | 0.947 3 | 33.4 | 0.840 3 | 27.5 | 0.755 7 |
表5 单一攻击下的鲁棒性测试结果
Tab. 5 Robustness test results under single attacks
| 攻击类型 | 所提方法 | 文献[ | 文献[ | |||
|---|---|---|---|---|---|---|
| PSNR/dB | SSIM | PSNR/dB | SSIM | PSNR/dB | SSIM | |
| 平均 | 37.1 | 0.935 5 | 29.8 | 0.829 5 | 30.0 | 0.796 1 |
| Salt and pepper | 38.5 | 0.961 2 | 31.8 | 0.875 7 | 30.9 | 0.850 8 |
| Poisson | 36.7 | 0.946 5 | 34.1 | 0.853 4 | 32.1 | 0.875 7 |
| Speckle | 37.2 | 0.958 3 | 30.5 | 0.822 8 | 30.8 | 0.835 2 |
| Average filter | 35.9 | 0.924 1 | 28.3 | 0.876 7 | 28.4 | 0.828 1 |
| Cropping(25%) | 34.1 | 0.919 5 | 26.7 | 0.793 3 | 26.2 | 0.716 5 |
| Cropping(50%) | 32.6 | 0.901 8 | 24.8 | 0.777 2 | 30.1 | 0.694 8 |
| Resize(50%) | 36.4 | 0.923 2 | 28.9 | 0.804 6 | 32.5 | 0.779 4 |
| Gaussian noise | 37.8 | 0.937 6 | 30.1 | 0.821 8 | 31.7 | 0.828 5 |
| JPEG Compression(QF=50) | 35.3 | 0.947 3 | 33.4 | 0.840 3 | 27.5 | 0.755 7 |
| [1] | 付章杰,王帆,孙星明,等. 基于深度学习的图像隐写方法研究[J]. 计算机学报, 2020, 43(9): 1656-1672. |
| FU Z J, WANG F, SUN X M, et al. Research on steganography of digital images based on deep learning[J]. Chinese Journal of Computers, 2020, 43(9): 1656-1672. | |
| [2] | MIELIKAINEN J. LSB matching revisited[J]. IEEE Signal Processing Letters, 2006, 13(5): 285-287. |
| [3] | WESTFELD A, PFITZMANN A. Attacks on steganographic systems: breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned[C]// Proceedings of the 3rd International Workshop on Information Hiding, LNCS 1768. Berlin: Springer, 2000: 61-76. |
| [4] | FRIDRICH J, GOLJAN M, DU R. Reliable detection of LSB steganography in color and grayscale images[C]// Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges. New York: ACM, 2001: 27-30. |
| [5] | WU D C, TSAI W H. A steganographic method for images by pixel value differencing[J]. Pattern Recognition Letters, 2003, 24(9/10): 1613-1626. |
| [6] | SWAIN G. Very high capacity image steganography technique using quotient value differencing and LSB substitution[J]. Arabian Journal for Science and Engineering, 2019, 44(4): 2995-3004. |
| [7] | PEVNÝ T, FILLER T, BAS P. Using high-dimensional image models to perform highly undetectable steganography[C]// Proceedings of the 2010 International Conference on Information Hiding, LNCS 6387. Berlin: Springer, 2010: 161-177. |
| [8] | HOLUB V, FRIDRICH J. Designing steganographic distortion using directional filters[C]// Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security. Piscataway: IEEE, 2012: 234-239. |
| [9] | LI B, TAN S, WANG M, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. |
| [10] | 王耀杰,钮可,杨晓元. 基于生成对抗网络的信息隐藏方案[J]. 计算机应用, 2018, 38(10): 2923-2928. |
| WANG Y J, NIU K, YANG X Y. Information hiding scheme based on generative adversarial network[J]. Journal of Computer Applications, 2018, 38(10): 2923-2928. | |
| [11] | ZHU J, KAPLAN R, JOHNSON J, et al. HiDDeN: hiding data with deep networks[C]// Proceedings of the 2018 European Conference on Computer Vision, LNCS 11219. Cham: Springer, 2018: 682-697. |
| [12] | AHMADI M, NOROUZI A, KARIMI N, et al. ReDMark: framework for residual diffusion watermarking based on deep networks[J]. Expert Systems with Applications, 2020, 146: No.113157. |
| [13] | ZHANG K A, CUESTA-INFANTE A, XU L, et al. SteganoGAN: high capacity image steganography with GANs[EB/OL]. [2024-02-20].. |
| [14] | LUO X, ZHAN R, CHANG H, et al. Distortion agnostic deep watermarking[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2020: 13545-13554. |
| [15] | BALUJA S. Hiding images in plain sight: deep steganography[C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. Red Hook: Curran Associates Inc., 2017: 2066-2076. |
| [16] | WU P, YANG Y, LI X. StegNet: mega image steganography capacity with deep convolutional network[J]. Future Internet, 2018, 10(6): No.54. |
| [17] | DUAN X, JIA K, LI B, et al. Reversible image steganography scheme based on a U-Net structure[J]. IEEE Access, 2019, 7: 9314-9323. |
| [18] | ZHANG R, DONG S, LIU J. Invisible steganography via generative adversarial networks[J]. Multimedia Tools and Applications, 2019, 78(7): 8559-8575. |
| [19] | MUÑOZ-RAMÍREZ D O, PONOMARYOV V, REYES-REYES R, et al. Steganographic framework for hiding a color image into digital images[C]// Proceedings of the 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology. Piscataway: IEEE, 2019: 63-66. |
| [20] | JENYNOF A, AHMAD T. Image to image steganography using U-Net architecture with MobileNet convolutional neural network[C]// Proceedings of the 14th International Conference on Computing Communication and Networking Technologies. Piscataway: IEEE, 2023: 1-7. |
| [21] | LIU X, MA Z, CHEN Z, et al. Hiding multiple images into a single image via joint compressive autoencoders[J]. Pattern Recognition, 2022, 131: No.108842. |
| [22] | ZHANG L, LU Y, LI J, et al. Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction[J]. Neural Computing and Applications, 2023, 35(15): 10909-10927. |
| [23] | SINGH B, SHARMA P K, HUDDEDAR S A, et al. StegGAN: hiding image within image using conditional generative adversarial networks[J]. Multimedia Tools and Applications, 2022, 81(28): 40511-40533. |
| [24] | XU G, WU H Z, SHI Y Q. Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Processing Letters, 2016, 23(5): 708-712. |
| [25] | YU C. Attention based data hiding with generative adversarial networks[C]// Proceedings of the 34th AAAI Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2020: 1120-1128. |
| [26] | ZHU X, CHENG D, ZHANG Z, et al. An empirical study of spatial attention mechanisms in deep networks[C]// Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision. Piscataway: IEEE, 2019: 6687-6696. |
| [27] | JIE H, LI S, GANG S. Squeeze-and-excitation networks[C]// Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2018: 7132-7141. |
| [28] | TAN J, LIAO X, LIU J, et al. Channel attention image steganography with generative adversarial networks[J]. IEEE Transactions on Network Science and Engineering, 2022, 9(2): 888-903. |
| [29] | WOO S, PARK J, LEE J Y, et al. CBAM: convolutional block attention module[C]// Proceedings of the 2018 European Conference on Computer Vision, LNCS 11211. Cham: Springer, 2018: 3-19. |
| [30] | YE J, NI J, YI Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2545-2557. |
| [31] | BOROUMAND M, CHEN M, FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(5): 1181-1193. |
| [32] | JOHNSON J, ALAHI A, LI F F. Perceptual losses for real-time style transfer and super-resolution[C]// Proceedings of the 2016 European Conference on Computer Vision, LNCS 9906. Cham: Springer, 2016: 694-711. |
| [33] | KINGMA D P, BA J L. Adam: a method for stochastic optimization[EB/OL]. [2024-01-30].. |
| [34] | WANG Z, BOUIK A C, SHEIKH H R, et al. Image quality assessment: from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004, 13(4): 600-612. |
| [35] | WANG Z, SIMONCELLI E P, BOVIK A C. Multiscale structural similarity for image quality assessment[C]// Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers. Piscataway: IEEE, 2003: 1398-1402. |
| [36] | SHEIKH H R, BOVIK A C. Image information and visual quality[J]. IEEE Transactions on Image Processing, 2006, 15(2): 430-444. |
| [37] | WANG Z, BOVIK A C. A universal image quality index[J]. IEEE Signal Processing Letters, 2002, 9(3): 81-84. |
| [38] | 张逸为,张卫明,俞能海. 针对特定测试样本的隐写分析方法[J]. 软件学报, 2018, 29(4): 987-1001. |
| ZHANG Y W, ZHANG W M, YU N H. Specific testing sample steganalysis[J]. Journal of Software, 2018, 29(4): 987-1001. | |
| [39] | ZHANG R, ZHU F, LIU J, et al. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1138-1150. |
| [1] | 郭泽一, 李凤莲, 徐利春. 基于双重决策机制的深度符号回归算法[J]. 《计算机应用》唯一官方网站, 2026, 46(2): 406-415. |
| [2] | 姜皓骞, 张东, 李冠宇, 陈恒. 基于结构增强的层次化任务导向提示策略的对话推荐系统SetaCRS[J]. 《计算机应用》唯一官方网站, 2026, 46(2): 368-377. |
| [3] | 林金娇, 张灿舜, 陈淑娅, 王天鑫, 连剑, 徐庸辉. 基于改进图注意力网络的车险欺诈检测方法[J]. 《计算机应用》唯一官方网站, 2026, 46(2): 437-444. |
| [4] | 边小勇, 袁培洋, 胡其仁. 双编码空频混合的红外小目标检测方法[J]. 《计算机应用》唯一官方网站, 2026, 46(1): 252-259. |
| [5] | 昝志辉, 王雅静, 李珂, 杨智翔, 杨光宇. 基于SAA-CNN-BiLSTM网络的多特征融合语音情感识别方法[J]. 《计算机应用》唯一官方网站, 2026, 46(1): 69-76. |
| [6] | 张宏俊, 潘高军, 叶昊, 陆玉彬, 缪宜恒. 结合深度学习和张量分解的多源异构数据分析方法[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2838-2847. |
| [7] | 李进, 刘立群. 基于残差Swin Transformer的SAR与可见光图像融合[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2949-2956. |
| [8] | 殷兵, 凌震华, 林垠, 奚昌凤, 刘颖. 兼容缺失模态推理的情感识别方法[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2764-2772. |
| [9] | 李维刚, 邵佳乐, 田志强. 基于双注意力机制和多尺度融合的点云分类与分割网络[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 3003-3010. |
| [10] | 许志雄, 李波, 边小勇, 胡其仁. 对抗样本嵌入注意力U型网络的3D医学图像分割[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 3011-3016. |
| [11] | 景攀峰, 梁宇栋, 李超伟, 郭俊茹, 郭晋育. 基于师生学习的半监督图像去雾算法[J]. 《计算机应用》唯一官方网站, 2025, 45(9): 2975-2983. |
| [12] | 廖炎华, 鄢元霞, 潘文林. 基于YOLOv9的交通路口图像的多目标检测算法[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2555-2565. |
| [13] | 彭鹏, 蔡子婷, 刘雯玲, 陈才华, 曾维, 黄宝来. 基于CNN和双向GRU混合孪生网络的语音情感识别方法[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2515-2521. |
| [14] | 张硕, 孙国凯, 庄园, 冯小雨, 王敬之. 面向区块链节点分析的eclipse攻击动态检测方法[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2428-2436. |
| [15] | 葛丽娜, 王明禹, 田蕾. 联邦学习的高效性研究综述[J]. 《计算机应用》唯一官方网站, 2025, 45(8): 2387-2398. |
| 阅读次数 | ||||||
|
全文 |
|
|||||
|
摘要 |
|
|||||