| [1] |
Yilin DENG, Fajiang YU.
Pseudo random number generator based on LSTM and separable self-attention mechanism
[J]. Journal of Computer Applications, 2025, 45(9): 2893-2901.
|
| [2] |
Jin ZHOU, Yuzhi LI, Xu ZHANG, Shuo GAO, Li ZHANG, Jiachuan SHENG.
Modulation recognition network for complex electromagnetic environments
[J]. Journal of Computer Applications, 2025, 45(8): 2672-2682.
|
| [3] |
Ying HUANG, Shengmei GAO, Guang CHEN, Su LIU.
Low-light image enhancement network combining signal-to-noise ratio guided dual-branch structure and histogram equalization
[J]. Journal of Computer Applications, 2025, 45(6): 1971-1979.
|
| [4] |
Hui LI, Bingzhi JIA, Chenxi WANG, Ziyu DONG, Jilong LI, Zhaoman ZHONG, Yanyan CHEN.
Generative adversarial network underwater image enhancement model based on Swin Transformer
[J]. Journal of Computer Applications, 2025, 45(5): 1439-1446.
|
| [5] |
Lihu PAN, Shouxin PENG, Rui ZHANG, Zhiyang XUE, Xuzhen MAO.
Video anomaly detection for moving foreground regions
[J]. Journal of Computer Applications, 2025, 45(4): 1300-1309.
|
| [6] |
Hong SHANGGUAN, Huiying REN, Xiong ZHANG, Xinglong HAN, Zhiguo GUI, Yanling WANG.
Low-dose CT denoising model based on dual encoder-decoder generative adversarial network
[J]. Journal of Computer Applications, 2025, 45(2): 624-632.
|
| [7] |
Guoyu XU, Xiaolong YAN, Yidan ZHANG.
DU-FastGAN: lightweight generative adversarial network based on dynamic-upsample
[J]. Journal of Computer Applications, 2025, 45(10): 3067-3073.
|
| [8] |
Li LIU, Haijin HOU, Anhong WANG, Tao ZHANG.
Generative data hiding algorithm based on multi-scale attention
[J]. Journal of Computer Applications, 2024, 44(7): 2102-2109.
|
| [9] |
Haoran WANG, Dan YU, Yuli YANG, Yao MA, Yongle CHEN.
Domain transfer intrusion detection method for unknown attacks on industrial control systems
[J]. Journal of Computer Applications, 2024, 44(4): 1158-1165.
|
| [10] |
Yi ZHENG, Cunyi LIAO, Tianqian ZHANG, Ji WANG, Shouyin LIU.
Image denoising-based cell-level RSRP estimation method for urban areas
[J]. Journal of Computer Applications, 2024, 44(3): 855-862.
|
| [11] |
Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE.
Deep shadow defense scheme of federated learning based on generative adversarial network
[J]. Journal of Computer Applications, 2024, 44(1): 223-232.
|
| [12] |
Anyang LIU, Huaici ZHAO, Wenlong CAI, Zechao XU, Ruideng XIE.
Adaptive image deblurring generative adversarial network algorithm based on active discrimination mechanism
[J]. Journal of Computer Applications, 2023, 43(7): 2288-2294.
|
| [13] |
Shaoquan CHEN, Jianping CAI, Lan SUN.
Differential privacy generative adversarial network algorithm with dynamic gradient threshold clipping
[J]. Journal of Computer Applications, 2023, 43(7): 2065-2072.
|
| [14] |
Xin JIN, Yangchuan LIU, Yechen ZHU, Zijian ZHANG, Xin GAO.
Sinogram inpainting for sparse-view cone-beam computed tomography image reconstruction based on residual encoder-decoder generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(6): 1950-1957.
|
| [15] |
Jinwen GUO, Xinghua MA, Gongning LUO, Wei WANG, Yang CAO, Kuanquan WANG.
Guidewire artifact removal method of structure-enhanced IVOCT based on Transformer
[J]. Journal of Computer Applications, 2023, 43(5): 1596-1605.
|