| [1] | 
													
														Yilin DENG, Fajiang YU. 
														
															Pseudo random number generator based on LSTM and separable self-attention mechanism
														[J]. Journal of Computer Applications, 2025, 45(9): 2893-2901.
													 | 
												
																																																																																
													| [2] | 
													
														Xiang WANG, Zhixiang CHEN, Guojun MAO. 
														
															Multivariate time series prediction method combining local and global correlation
														[J]. Journal of Computer Applications, 2025, 45(9): 2806-2816.
													 | 
												
																																																																																
													| [3] | 
													
														Dengran REN, Shuying WANG. 
														
															Nested named entity recognition model for wind power equipment based on differential boundary enhancement
														[J]. Journal of Computer Applications, 2025, 45(9): 2798-2805.
													 | 
												
																																																																																
													| [4] | 
													
														Li LI, Han SONG, Peihe LIU, Hanlin CHEN. 
														
															Named entity recognition for sensitive information based on data augmentation and residual networks
														[J]. Journal of Computer Applications, 2025, 45(9): 2790-2797.
													 | 
												
																																																																																
													| [5] | 
													
														Jing YU, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN. 
														
															Sequence labeling optimization method combined with entity boundary offset
														[J]. Journal of Computer Applications, 2025, 45(8): 2522-2529.
													 | 
												
																																																																																
													| [6] | 
													
														Lixiao ZHANG, Yao MA, Yuli YANG, Dan YU, Yongle CHEN. 
														
															Large-scale IoT binary component identification based on named entity recognition
														[J]. Journal of Computer Applications, 2025, 45(7): 2288-2295.
													 | 
												
																																																																																
													| [7] | 
													
														Chen LIANG, Yisen WANG, Qiang WEI, Jiang DU. 
														
															Source code vulnerability detection method based on Transformer-GCN
														[J]. Journal of Computer Applications, 2025, 45(7): 2296-2303.
													 | 
												
																																																																																
													| [8] | 
													
														Zhangjie XU, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN. 
														
															Nested named entity recognition combined with boundary generation by multi-objective learning
														[J]. Journal of Computer Applications, 2025, 45(7): 2229-2236.
													 | 
												
																																																																																
													| [9] | 
													
														Xiaoqiang ZHAO, Yongyong LIU, Yongyong HUI, Kai LIU. 
														
															Batch process quality prediction model using improved time-domain convolutional network with multi-head self-attention mechanism
														[J]. Journal of Computer Applications, 2025, 45(7): 2245-2252.
													 | 
												
																																																																																
													| [10] | 
													
														Biqing ZENG, Guangbin ZHONG, James Zhiqing WEN. 
														
															Few-shot named entity recognition based on decomposed fuzzy span
														[J]. Journal of Computer Applications, 2025, 45(5): 1504-1510.
													 | 
												
																																																																																
													| [11] | 
													
														Jie HU, Shuaixing WU, Zhilan CAO, Yan ZHANG. 
														
															Named entity recognition model based on global information fusion and multi-dimensional relation perception
														[J]. Journal of Computer Applications, 2025, 45(5): 1511-1519.
													 | 
												
																																																																																
													| [12] | 
													
														Hui LI, Bingzhi JIA, Chenxi WANG, Ziyu DONG, Jilong LI, Zhaoman ZHONG, Yanyan CHEN. 
														
															Generative adversarial network underwater image enhancement model based on Swin Transformer
														[J]. Journal of Computer Applications, 2025, 45(5): 1439-1446.
													 | 
												
																																																																																
													| [13] | 
													
														Kunyuan JIANG, Xiaoxia LI, Li WANG, Yaodan CAO, Xiaoqiang ZHANG, Nan DING, Yingyue ZHOU. 
														
															Boundary-cross supervised semantic segmentation network with decoupled residual self-attention
														[J]. Journal of Computer Applications, 2025, 45(4): 1120-1129.
													 | 
												
																																																																																
													| [14] | 
													
														Yonggang GONG, Shuhan CHEN, Xiaoqin LIAN, Qiansheng LI, Hongming MO, Hongyu LIU. 
														
															Entity-relation extraction strategy in Chinese open-domains based on large language model
														[J]. Journal of Computer Applications, 2025, 45(10): 3121-3130.
													 | 
												
																																																																																
													| [15] | 
													
														Jintao FAN, Yanping CHEN, Caiwei YANG, Chuan LIN. 
														
															Nested named entity recognition by contrastive learning with boundary information
														[J]. Journal of Computer Applications, 2025, 45(10): 3111-3120.
													 |