[1] |
Lihu PAN, Shouxin PENG, Rui ZHANG, Zhiyang XUE, Xuzhen MAO.
Video anomaly detection for moving foreground regions
[J]. Journal of Computer Applications, 2025, 45(4): 1300-1309.
|
[2] |
Yiding WANG, Zehao WANG, Yaoli LI, Shaoqing CAI, Yuan YUAN.
Multi-scale 2D-Adaboost microscopic image recognition algorithm of Chinese medicinal materials powder
[J]. Journal of Computer Applications, 2025, 45(4): 1325-1332.
|
[3] |
Yang ZHOU, Hui LI.
Remote sensing image building extraction network based on dual promotion of semantic and detailed features
[J]. Journal of Computer Applications, 2025, 45(4): 1310-1316.
|
[4] |
Ruilong CHEN, Tao HU, Youjun BU, Peng YI, Xianjun HU, Wei QIAO.
Stacking ensemble adversarial defense method for encrypted malicious traffic detection model
[J]. Journal of Computer Applications, 2025, 45(3): 864-871.
|
[5] |
Zhenhua XUE, Qiang LI, Chao HUANG.
Vision foundation model-driven pixel-level image anomaly detection method
[J]. Journal of Computer Applications, 2025, 45(3): 823-831.
|
[6] |
Zirong HONG, Guangqing BAO.
Review of radar automatic target recognition based on ensemble learning
[J]. Journal of Computer Applications, 2025, 45(2): 371-382.
|
[7] |
Zhongwei ZHANG, Jun WANG, Shudong LIU, Zhiheng WANG.
Object detection in remote sensing image based on multi-scale feature fusion and weighted boxes fusion
[J]. Journal of Computer Applications, 2025, 45(2): 633-639.
|
[8] |
Yan LI, Guanhua YE, Yawen LI, Meiyu LIANG.
Enterprise ESG indicator prediction model based on richness coordination technology
[J]. Journal of Computer Applications, 2025, 45(2): 670-676.
|
[9] |
Miaolei DENG, Yupei KAN, Chuanchuan SUN, Haihang XU, Shaojun FAN, Xin ZHOU.
Summary of network intrusion detection systems based on deep learning
[J]. Journal of Computer Applications, 2025, 45(2): 453-466.
|
[10] |
Songsen YU, Zhifan LIN, Guopeng XUE, Jianyu XU.
Lightweight large-format tile defect detection algorithm based on improved YOLOv8
[J]. Journal of Computer Applications, 2025, 45(2): 647-654.
|
[11] |
Danni DING, Bo PENG, Xi WU.
VPNet: fatty liver ultrasound image classification method inspired by ventral pathway
[J]. Journal of Computer Applications, 2025, 45(2): 662-669.
|
[12] |
Tianqi ZHANG, Shuang TAN, Xiwen SHEN, Juan TANG.
Image watermarking method combining attention mechanism and multi-scale feature
[J]. Journal of Computer Applications, 2025, 45(2): 616-623.
|
[13] |
Siqi ZHANG, Jinjun ZHANG, Tianyi WANG, Xiaolin QIN.
Deep temporal event detection algorithm based on signal temporal logic
[J]. Journal of Computer Applications, 2025, 45(1): 90-97.
|
[14] |
Zidong CHENG, Peng LI, Feng ZHU.
Potential relation mining in internet of things threat intelligence knowledge graph
[J]. Journal of Computer Applications, 2025, 45(1): 24-31.
|
[15] |
Zongsheng ZHENG, Jia DU, Yuhe CHENG, Zecheng ZHAO, Yuewei ZHANG, Xulong WANG.
Cross-modal dual-stream alternating interactive network for infrared-visible image classification
[J]. Journal of Computer Applications, 2025, 45(1): 275-283.
|