[1] |
Rui SHI, Yong LI, Yanhan ZHU.
Adversarial sample attack algorithm of modulation signal based on equalization of feature gradient
[J]. Journal of Computer Applications, 2024, 44(8): 2521-2527.
|
[2] |
Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG.
Deep network compression method based on low-rank decomposition and vector quantization
[J]. Journal of Computer Applications, 2024, 44(7): 1987-1994.
|
[3] |
Mengmei YAN, Dongping YANG.
Review of mean field theory for deep neural network
[J]. Journal of Computer Applications, 2024, 44(2): 331-343.
|
[4] |
Xujian ZHAO, Hanglin LI.
Deep neural network compression algorithm based on hybrid mechanism
[J]. Journal of Computer Applications, 2023, 43(9): 2686-2691.
|
[5] |
Yunfei SHEN, Fei SHEN, Fang LI, Jun ZHANG.
Deep neural network model acceleration method based on tensor virtual machine
[J]. Journal of Computer Applications, 2023, 43(9): 2836-2844.
|
[6] |
Xiaolin LI, Songjia YANG.
Hybrid beamforming for multi-user mmWave relay networks using deep learning
[J]. Journal of Computer Applications, 2023, 43(8): 2511-2516.
|
[7] |
Haiyu YANG, Wenpu GUO, Kai KANG.
Signal modulation recognition method based on convolutional long short-term deep neural network
[J]. Journal of Computer Applications, 2023, 43(4): 1318-1322.
|
[8] |
LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng.
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold
[J]. Journal of Computer Applications, 2023, 43(1): 67-73.
|
[9] |
Wentao MAO, Guifang WU, Chao WU, Zhi DOU.
Animation video generation model based on Chinese impressionistic style transfer
[J]. Journal of Computer Applications, 2022, 42(7): 2162-2169.
|
[10] |
Meng YU, Wentao HE, Xuchuan ZHOU, Mengtian CUI, Keqi WU, Wenjie ZHOU.
Review of recommendation system
[J]. Journal of Computer Applications, 2022, 42(6): 1898-1913.
|
[11] |
Xiao QIN, Miao CHENG, Shaobing ZHANG, Lian HE, Xiangwen SHI, Pinxue WANG, Shang ZENG.
Pruning of YOLOv4 based on rank information in industrial scenes
[J]. Journal of Computer Applications, 2022, 42(5): 1417-1423.
|
[12] |
Quan CHEN, Li LI, Yongle CHEN, Yuexing DUAN.
Adversarial attack algorithm for deep learning interpretability
[J]. Journal of Computer Applications, 2022, 42(2): 510-518.
|
[13] |
Xinyuan QIU, Zecong YE, Xiaolong CUI, Zhiqiang GAO.
Survey of communication overhead of federated learning
[J]. Journal of Computer Applications, 2022, 42(2): 333-342.
|
[14] |
Anyi WANG, Heng ZHANG.
Multi-input multi-output intelligent receiver model based on multi-label classification algorithm
[J]. Journal of Computer Applications, 2022, 42(10): 3124-3129.
|
[15] |
HUANG Jishuang, ZHANG Hua, LI Yonglong, ZHAO Hao, WANG Haoran, FENG Chuncheng.
Hydraulic tunnel defect recognition method based on dynamic feature distillation
[J]. Journal of Computer Applications, 2021, 41(8): 2358-2365.
|