[1] |
Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG.
Deep network compression method based on low-rank decomposition and vector quantization
[J]. Journal of Computer Applications, 2024, 44(7): 1987-1994.
|
[2] |
Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG.
Binary code identification based on user system call sequences
[J]. Journal of Computer Applications, 2024, 44(7): 2160-2167.
|
[3] |
Xiangjie SUN, Qiang WEI, Yisen WANG, Jiang DU.
Survey of code similarity detection technology
[J]. Journal of Computer Applications, 2024, 44(4): 1248-1258.
|
[4] |
Yu ZHANG, Yan CHANG, Shibin ZHANG.
Adversarial example detection algorithm based on quantum local intrinsic dimensionality
[J]. Journal of Computer Applications, 2024, 44(2): 490-495.
|
[5] |
Jian LIU, Chenchen YOU, Jinming CAO, Qiong ZENG, Changhe TU.
Construction and application of 3D dataset of human grasping objects
[J]. Journal of Computer Applications, 2024, 44(1): 278-284.
|
[6] |
Xujian ZHAO, Hanglin LI.
Deep neural network compression algorithm based on hybrid mechanism
[J]. Journal of Computer Applications, 2023, 43(9): 2686-2691.
|
[7] |
Meiying CHENG, Qian QIAN, Weiqing XIONG.
Symbiotic organisms search algorithm for information transfer multi-task optimization
[J]. Journal of Computer Applications, 2023, 43(7): 2237-2247.
|
[8] |
Weikang CHEN, Qiqing ZHAI, Youguo WANG.
Multivariate communication system based on discrete bidirectional associative memory neural network
[J]. Journal of Computer Applications, 2023, 43(3): 848-852.
|
[9] |
Yu HONG, Hongchang CHEN, Jianpeng ZHANG, Ruiyang HUANG.
Graph summarization algorithm based on node similarity grouping and graph compression
[J]. Journal of Computer Applications, 2023, 43(10): 3047-3053.
|
[10] |
GAO Yuanyuan, YU Zhenhua, DU Fang, SONG Lijuan.
Unlabeled network pruning algorithm based on Bayesian optimization
[J]. Journal of Computer Applications, 2023, 43(1): 30-36.
|
[11] |
LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng.
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold
[J]. Journal of Computer Applications, 2023, 43(1): 67-73.
|
[12] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[13] |
Lin SUN, Jing ZHAO, Jiucheng XU, Xinya WANG.
Feature selection algorithm based on neighborhood rough set and monarch butterfly optimization
[J]. Journal of Computer Applications, 2022, 42(5): 1355-1366.
|
[14] |
Bing XIA, Jianmin PANG, Xin ZHOU, Zheng SHAN.
Research progress on binary code similarity search
[J]. Journal of Computer Applications, 2022, 42(4): 985-998.
|
[15] |
Shuting XUAN, Jinglei LIU.
Clustering based on discrete hashing
[J]. Journal of Computer Applications, 2022, 42(3): 713-723.
|