[1] |
Shiyue GUO, Jianwu DANG, Yangping WANG, Jiu YONG.
3D hand pose estimation combining attention mechanism and multi-scale feature fusion
[J]. Journal of Computer Applications, 2025, 45(4): 1293-1299.
|
[2] |
Lihu PAN, Shouxin PENG, Rui ZHANG, Zhiyang XUE, Xuzhen MAO.
Video anomaly detection for moving foreground regions
[J]. Journal of Computer Applications, 2025, 45(4): 1300-1309.
|
[3] |
Yiding WANG, Zehao WANG, Yaoli LI, Shaoqing CAI, Yuan YUAN.
Multi-scale 2D-Adaboost microscopic image recognition algorithm of Chinese medicinal materials powder
[J]. Journal of Computer Applications, 2025, 45(4): 1325-1332.
|
[4] |
Chun XU, Shuangyan JI, Huan MA, Enwei SUN, Mengmeng WANG, Mingyu SU.
Consultation recommendation method based on knowledge graph and dialogue structure
[J]. Journal of Computer Applications, 2025, 45(4): 1157-1168.
|
[5] |
Liqin WANG, Zhilei GENG, Yingshuang LI, Yongfeng DONG, Meng BIAN.
Open-world knowledge reasoning model based on path and enhanced triplet text
[J]. Journal of Computer Applications, 2025, 45(4): 1177-1183.
|
[6] |
Yang ZHOU, Hui LI.
Remote sensing image building extraction network based on dual promotion of semantic and detailed features
[J]. Journal of Computer Applications, 2025, 45(4): 1310-1316.
|
[7] |
Jie HU, Qiyang ZHENG, Jun SUN, Yan ZHANG.
Multi-label classification model based on multi-label relational graph and local dynamic reconstruction learning
[J]. Journal of Computer Applications, 2025, 45(4): 1104-1112.
|
[8] |
Liwei ZHANG, Quan LIANG, Yutao HU, Qiaole ZHU.
Channel shuffle attention mechanism based on group convolution
[J]. Journal of Computer Applications, 2025, 45(4): 1069-1076.
|
[9] |
Kunyuan JIANG, Xiaoxia LI, Li WANG, Yaodan CAO, Xiaoqiang ZHANG, Nan DING, Yingyue ZHOU.
Boundary-cross supervised semantic segmentation network with decoupled residual self-attention
[J]. Journal of Computer Applications, 2025, 45(4): 1120-1129.
|
[10] |
Zhenhua XUE, Qiang LI, Chao HUANG.
Vision foundation model-driven pixel-level image anomaly detection method
[J]. Journal of Computer Applications, 2025, 45(3): 823-831.
|
[11] |
Baohua YUAN, Jialu CHEN, Huan WANG.
Medical image segmentation network integrating multi-scale semantics and parallel double-branch
[J]. Journal of Computer Applications, 2025, 45(3): 988-995.
|
[12] |
Ruilong CHEN, Tao HU, Youjun BU, Peng YI, Xianjun HU, Wei QIAO.
Stacking ensemble adversarial defense method for encrypted malicious traffic detection model
[J]. Journal of Computer Applications, 2025, 45(3): 864-871.
|
[13] |
Haijun GENG, Yun DONG, Zhiguo HU, Haotian CHI, Jing YANG, Xia YIN.
Encrypted traffic classification method based on Attention-1DCNN-CE
[J]. Journal of Computer Applications, 2025, 45(3): 872-882.
|
[14] |
Miaolei DENG, Yupei KAN, Chuanchuan SUN, Haihang XU, Shaojun FAN, Xin ZHOU.
Summary of network intrusion detection systems based on deep learning
[J]. Journal of Computer Applications, 2025, 45(2): 453-466.
|
[15] |
Songsen YU, Zhifan LIN, Guopeng XUE, Jianyu XU.
Lightweight large-format tile defect detection algorithm based on improved YOLOv8
[J]. Journal of Computer Applications, 2025, 45(2): 647-654.
|