[1] |
Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN.
Review of marine ship communication cybersecurity
[J]. Journal of Computer Applications, 2024, 44(7): 2123-2136.
|
[2] |
Chenghao YANG, Jie HU, Hongjun WANG, Bo PENG.
Incomplete multi-view clustering algorithm based on attention mechanism
[J]. Journal of Computer Applications, 2024, 44(12): 3784-3789.
|
[3] |
Bona XUAN, Jin LI, Yafei SONG, Zexuan MA.
Malicious code classification method based on improved MobileNetV2
[J]. Journal of Computer Applications, 2023, 43(7): 2217-2225.
|
[4] |
Yi WANG, Shenglei PEI, Yu WANG.
Indoor positioning method of multi-fingerprint database based on channel state information and K-means-SVR
[J]. Journal of Computer Applications, 2023, 43(5): 1636-1640.
|
[5] |
Ran ZHAI, Xuebin CHEN, Guopeng ZHANG, Langtao PEI, Zheng MA.
Improved K-anonymity privacy protection algorithm based on different sensitivities
[J]. Journal of Computer Applications, 2023, 43(5): 1497-1503.
|
[6] |
Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA.
Review of zero trust network and its key technologies
[J]. Journal of Computer Applications, 2023, 43(4): 1142-1150.
|
[7] |
Xiaofei WANG, Shengli BAO, Jionghuan CHEN.
Missing value attention clustering algorithm based on latent factor model in subspace
[J]. Journal of Computer Applications, 2023, 43(12): 3772-3778.
|
[8] |
Yuhang LI, Yuli YANG, Yao MA, Dan YU, Yongle CHEN.
Text adversarial example generation method based on BERT model
[J]. Journal of Computer Applications, 2023, 43(10): 3093-3098.
|
[9] |
WANG Jindong, LI Qiang.
Improved practical Byzantine fault tolerance consensus algorithm based on Raft algorithm
[J]. Journal of Computer Applications, 2023, 43(1): 122-129.
|
[10] |
SUN Zeqiang, CHEN Bingcai, CUI Xiaobo, WANG Lei, LU Yanuo.
Strip steel surface defect detection by YOLOv5 algorithm fusing frequency domain attention mechanism and decoupled head
[J]. Journal of Computer Applications, 2023, 43(1): 242-249.
|
[11] |
Man ZHANG, Zhengjun ZHANG, Junqi FENG, Tao YAN.
Density peak clustering algorithm based on adaptive reachable distance
[J]. Journal of Computer Applications, 2022, 42(6): 1914-1921.
|
[12] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[13] |
WANG Jiarui, TAN Guoping, ZHOU Siyuan.
Clustered wireless federated learning algorithm in high-speed internet of vehicles scenes
[J]. Journal of Computer Applications, 2021, 41(6): 1546-1550.
|
[14] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[15] |
TANG Yanqiang, LI Chenghai, SONG Yafei.
Network security situation prediction based on improved particle swarm optimization and extreme learning machine
[J]. Journal of Computer Applications, 2021, 41(3): 768-773.
|