[1] |
Qingli CHEN, Yuanbo GUO, Chen FANG.
Clustering federated learning algorithm for heterogeneous data
[J]. Journal of Computer Applications, 2025, 45(4): 1086-1094.
|
[2] |
Renjie TIAN, Mingli JING, Long JIAO, Fei WANG.
Recommendation algorithm of graph contrastive learning based on hybrid negative sampling
[J]. Journal of Computer Applications, 2025, 45(4): 1053-1060.
|
[3] |
Haitao SUN, Jiayu LIN, Zuhong LIANG, Jie GUO.
Data augmentation technique incorporating label confusion for Chinese text classification
[J]. Journal of Computer Applications, 2025, 45(4): 1113-1119.
|
[4] |
Meirong DING, Jinxin ZHUO, Yuwu LU, Qinglong LIU, Jicong LANG.
Domain adaptation integrating environment label smoothing and nuclear norm discrepancy
[J]. Journal of Computer Applications, 2025, 45(4): 1130-1138.
|
[5] |
Yu WANG, Xianjin FANG, Gaoming YANG, Yifeng DING, Xinlu YANG.
Active defense against face forgery based on attention mask and feature extraction
[J]. Journal of Computer Applications, 2025, 45(3): 904-910.
|
[6] |
Kun SHENG, Zhongqing WANG.
Synaesthesia metaphor analysis based on large language model and data augmentation
[J]. Journal of Computer Applications, 2025, 45(3): 794-800.
|
[7] |
Chenwei SUN, Junli HOU, Xianggen LIU, Jiancheng LYU.
Large language model prompt generation method for engineering drawing understanding
[J]. Journal of Computer Applications, 2025, 45(3): 801-807.
|
[8] |
Kun FU, Shicong YING, Tingting ZHENG, Jiajie QU, Jingyuan CUI, Jianwei LI.
Graph data augmentation method for few-shot node classification
[J]. Journal of Computer Applications, 2025, 45(2): 392-402.
|
[9] |
Qiurun HE, Jie HU, Bo PENG, Tianyuan LI.
Fabric defect detection algorithm based on context information and multi-scale feature fusion
[J]. Journal of Computer Applications, 2025, 45(2): 640-646.
|
[10] |
Xuewen YAN, Zhangjin HUANG.
Few-shot image classification method based on contrast learning
[J]. Journal of Computer Applications, 2025, 45(2): 383-391.
|
[11] |
Tianqi ZHANG, Shuang TAN, Xiwen SHEN, Juan TANG.
Image watermarking method combining attention mechanism and multi-scale feature
[J]. Journal of Computer Applications, 2025, 45(2): 616-623.
|
[12] |
Jialin ZHANG, Qinghua REN, Qirong MAO.
Speaker verification system utilizing global-local feature dependency for anti-spoofing
[J]. Journal of Computer Applications, 2025, 45(1): 308-317.
|
[13] |
Chunxia LIU, Hanying XU, Gaimei GAO, Weichao DANG, Zilu LI.
Smart contract vulnerability detection method based on echo state network
[J]. Journal of Computer Applications, 2025, 45(1): 153-161.
|
[14] |
Jietao LIANG, Bing LUO, Lanhui FU, Qingling CHANG, Nannan LI, Ningbo YI, Qi FENG, Xin HE, Fuqin DENG.
Point cloud registration method based on coordinate geometric sampling
[J]. Journal of Computer Applications, 2025, 45(1): 214-222.
|
[15] |
Xin YANG, Xueni CHEN, Chunjiang WU, Shijie ZHOU.
Short-term traffic flow prediction of urban highway based on variant residual model and Transformer
[J]. Journal of Computer Applications, 2024, 44(9): 2947-2951.
|