| [1] |
Yonghao LIANG, Jinlong LI.
Novel message passing network for neural Boolean satisfiability problem solver
[J]. Journal of Computer Applications, 2025, 45(9): 2934-2940.
|
| [2] |
Yilin DENG, Fajiang YU.
Pseudo random number generator based on LSTM and separable self-attention mechanism
[J]. Journal of Computer Applications, 2025, 45(9): 2893-2901.
|
| [3] |
Jintao SU, Lina GE, Liguang XIAO, Jing ZOU, Zhe WANG.
Detection and defense scheme for backdoor attacks in federated learning
[J]. Journal of Computer Applications, 2025, 45(8): 2399-2408.
|
| [4] |
Hailin XIAO, Yudong YANG, Ziyi YANG, Hailong LIU, Yu WANG, Zhongshan ZHANG, Xiaoming DAI.
Design and implementation of FPGA hardware structure optimization based on R22FFT algorithm
[J]. Journal of Computer Applications, 2025, 45(8): 2637-2645.
|
| [5] |
Xiaoyang ZHAO, Xinzheng XU, Zhongnian LI.
Research review on explainable artificial intelligence in internet of things applications
[J]. Journal of Computer Applications, 2025, 45(7): 2169-2179.
|
| [6] |
Wei CHEN, Changyong SHI, Chuanxiang MA.
Crop disease recognition method based on multi-modal data fusion
[J]. Journal of Computer Applications, 2025, 45(3): 840-848.
|
| [7] |
Zeyi CAO, Yan CHANG, Renxin LAI, Shibin ZHANG, Zhi QIN, Lili YAN, Xuejian ZHANG, Yuanhao DI.
Attribute-based entity alignment algorithm for decentralized data storage in large-scale institutions
[J]. Journal of Computer Applications, 2025, 45(10): 3195-3202.
|
| [8] |
Jianli DING, Yufeng HE, Jing WANG.
Causal intervention-based root cause analysis method for microservice system faults
[J]. Journal of Computer Applications, 2025, 45(1): 196-203.
|
| [9] |
Yi LIU, Guoli YANG, Qibin ZHENG, Xiang LI, Yangsen ZHOU, Depeng CHEN.
Architecture design of data fusion pipeline for unmanned systems
[J]. Journal of Computer Applications, 2024, 44(8): 2536-2543.
|
| [10] |
Yuemei XU, Ling HU, Jiayi ZHAO, Wanze DU, Wenqing WANG.
Technology application prospects and risk challenges of large language models
[J]. Journal of Computer Applications, 2024, 44(6): 1655-1662.
|
| [11] |
Wei LUO, Jinquan LIU, Zheng ZHANG.
Dual vertical federated learning framework incorporating secret sharing technology
[J]. Journal of Computer Applications, 2024, 44(6): 1872-1879.
|
| [12] |
Xiang LIU, Bei HUA, Fei LIN, Hongyuan WEI.
Design and implementation of component-based development framework for deep learning applications
[J]. Journal of Computer Applications, 2024, 44(2): 526-535.
|
| [13] |
Wenze CHAI, Jing FAN, Shukui SUN, Yiming LIANG, Jingfeng LIU.
Overview of deep metric learning
[J]. Journal of Computer Applications, 2024, 44(10): 2995-3010.
|
| [14] |
Tong CHEN, Jiwei WEI, Shiyuan HE, Jingkuan SONG, Yang YANG.
Adversarial training method with adaptive attack strength
[J]. Journal of Computer Applications, 2024, 44(1): 94-100.
|
| [15] |
Jian CUI, Kailang MA, Yu SUN, Dou WANG, Junliang ZHOU.
Deep explainable method for encrypted traffic classification
[J]. Journal of Computer Applications, 2023, 43(4): 1151-1159.
|