[1] |
Jintao SU, Lina GE, Liguang XIAO, Jing ZOU, Zhe WANG.
Detection and defense scheme for backdoor attacks in federated learning
[J]. Journal of Computer Applications, 2025, 45(8): 2399-2408.
|
[2] |
Hailin XIAO, Yudong YANG, Ziyi YANG, Hailong LIU, Yu WANG, Zhongshan ZHANG, Xiaoming DAI.
Design and implementation of FPGA hardware structure optimization based on R22FFT algorithm
[J]. Journal of Computer Applications, 2025, 45(8): 2637-2645.
|
[3] |
Xiaoyang ZHAO, Xinzheng XU, Zhongnian LI.
Research review on explainable artificial intelligence in internet of things applications
[J]. Journal of Computer Applications, 2025, 45(7): 2169-2179.
|
[4] |
Wei CHEN, Changyong SHI, Chuanxiang MA.
Crop disease recognition method based on multi-modal data fusion
[J]. Journal of Computer Applications, 2025, 45(3): 840-848.
|
[5] |
Jianli DING, Yufeng HE, Jing WANG.
Causal intervention-based root cause analysis method for microservice system faults
[J]. Journal of Computer Applications, 2025, 45(1): 196-203.
|
[6] |
Yi LIU, Guoli YANG, Qibin ZHENG, Xiang LI, Yangsen ZHOU, Depeng CHEN.
Architecture design of data fusion pipeline for unmanned systems
[J]. Journal of Computer Applications, 2024, 44(8): 2536-2543.
|
[7] |
Wei LUO, Jinquan LIU, Zheng ZHANG.
Dual vertical federated learning framework incorporating secret sharing technology
[J]. Journal of Computer Applications, 2024, 44(6): 1872-1879.
|
[8] |
Yuemei XU, Ling HU, Jiayi ZHAO, Wanze DU, Wenqing WANG.
Technology application prospects and risk challenges of large language models
[J]. Journal of Computer Applications, 2024, 44(6): 1655-1662.
|
[9] |
Xiang LIU, Bei HUA, Fei LIN, Hongyuan WEI.
Design and implementation of component-based development framework for deep learning applications
[J]. Journal of Computer Applications, 2024, 44(2): 526-535.
|
[10] |
Wenze CHAI, Jing FAN, Shukui SUN, Yiming LIANG, Jingfeng LIU.
Overview of deep metric learning
[J]. Journal of Computer Applications, 2024, 44(10): 2995-3010.
|
[11] |
Tong CHEN, Jiwei WEI, Shiyuan HE, Jingkuan SONG, Yang YANG.
Adversarial training method with adaptive attack strength
[J]. Journal of Computer Applications, 2024, 44(1): 94-100.
|
[12] |
Jian CUI, Kailang MA, Yu SUN, Dou WANG, Junliang ZHOU.
Deep explainable method for encrypted traffic classification
[J]. Journal of Computer Applications, 2023, 43(4): 1151-1159.
|
[13] |
Pengxin TIAN, Guannan SI, Zhaoliang AN, Jianxin LI, Fengyu ZHOU.
Survey of data-driven intelligent cloud-edge collaboration
[J]. Journal of Computer Applications, 2023, 43(10): 3162-3169.
|
[14] |
Jiaxuan WEI, Shikang DU, Zhixuan YU, Ruisheng ZHANG.
Review of white-box adversarial attack technologies in image classification
[J]. Journal of Computer Applications, 2022, 42(9): 2732-2741.
|
[15] |
Xiuli REN, Lei ZHANG.
Improved multi-primary-node consensus mechanism based on practical Byzantine fault tolerance
[J]. Journal of Computer Applications, 2022, 42(5): 1500-1507.
|