[1] |
Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG.
Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU
[J]. Journal of Computer Applications, 2024, 44(8): 2493-2499.
|
[2] |
Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG.
Review on security threats and defense measures in federated learning
[J]. Journal of Computer Applications, 2024, 44(6): 1663-1672.
|
[3] |
Mingzhu LEI, Hao WANG, Rong JIA, Lin BAI, Xiaoying PAN.
Oversampling algorithm based on synthesizing minority class samples using relationship between features
[J]. Journal of Computer Applications, 2024, 44(5): 1428-1436.
|
[4] |
Lin GAO, Yu ZHOU, Tak Wu KWONG.
Evolutionary bi-level adaptive local feature selection
[J]. Journal of Computer Applications, 2024, 44(5): 1408-1414.
|
[5] |
Min SUN, Qian CHENG, Xining DING.
CBAM-CGRU-SVM based malware detection method for Android
[J]. Journal of Computer Applications, 2024, 44(5): 1539-1545.
|
[6] |
Lin SUN, Menghan LIU.
K-means clustering based on adaptive cuckoo optimization feature selection
[J]. Journal of Computer Applications, 2024, 44(3): 831-841.
|
[7] |
Weina DONG, Jia LIU, Xiaozhong PAN, Lifeng CHEN, Wenquan SUN.
High-capacity robust image steganography scheme based on encoding-decoding network
[J]. Journal of Computer Applications, 2024, 44(3): 772-779.
|
[8] |
Dapeng XU, Xinmin HOU.
Feature selection method for graph neural network based on network architecture design
[J]. Journal of Computer Applications, 2024, 44(3): 663-670.
|
[9] |
Shengjie MENG, Wanjun YU, Ying CHEN.
Feature selection algorithm for high-dimensional data with maximum correlation and maximum difference
[J]. Journal of Computer Applications, 2024, 44(3): 767-771.
|
[10] |
Jintao RAO, Zhe CUI.
Electronic voting scheme based on SM2 threshold blind signature
[J]. Journal of Computer Applications, 2024, 44(2): 512-518.
|
[11] |
Jingxin LIU, Wenjing HUANG, Liangsheng XU, Chong HUANG, Jiansheng WU.
Unsupervised feature selection model with dictionary learning and sample correlation preservation
[J]. Journal of Computer Applications, 2024, 44(12): 3766-3775.
|
[12] |
Jie HUANG, Ruizi WU, Junli LI.
Efficient adaptive robustness optimization algorithm for complex networks
[J]. Journal of Computer Applications, 2024, 44(11): 3530-3539.
|
[13] |
Han WANG, Yuan WAN, Dong WANG, Yiming DING.
Robust weight matrix combination selection method of broad learning system
[J]. Journal of Computer Applications, 2024, 44(10): 3032-3038.
|
[14] |
Enbao QIAO, Xiangyang GAO, Jun CHENG.
Self-recovery adaptive Monte Carlo localization algorithm based on support vector machine
[J]. Journal of Computer Applications, 2024, 44(10): 3246-3251.
|
[15] |
Xuyan ZHAO, Yunhe CUI, Chaohui JIANG, Qing QIAN, Guowei SHEN, Chun GUO, Xianchao LI.
CHAIN: edge computing node placement algorithm based on overlapping domination
[J]. Journal of Computer Applications, 2023, 43(9): 2812-2818.
|