[1] |
Jianfang CAO, Minmin YAN, Yiming JIA, Xiaodong TIAN.
Application of Inception-v3 model integrated with transfer learning in dynasty identification of ancient murals
[J]. Journal of Computer Applications, 2021, 41(11): 3219-3227.
|
[2] |
PAN Chunxia, YANG Qiuhui, TAN Wukun, DENG Huixin, WU Jia.
Data preprocessing method in software defect prediction
[J]. Journal of Computer Applications, 2020, 40(11): 3273-3279.
|
[3] |
LI Kunming, WANG Chaoqian, NI Weiwei, BAO Xiaohan.
High-precision histogram publishing method based on differential privacy
[J]. Journal of Computer Applications, 2020, 40(11): 3242-3248.
|
[4] |
CHEN Lichao, ZHANG Lei, CAO Jianfang, ZHANG Rui.
Vehicle classification based on HOG-C CapsNet in traffic surveillance scenarios
[J]. Journal of Computer Applications, 2020, 40(10): 2881-2889.
|
[5] |
REN Shuai, XU Zhenchao, WANG Zhen, HE Yuan, ZHANG Tao, SU Dongxu, MU Dejun.
Low-density 3D model information hiding algorithm based on multple fusion states
[J]. Journal of Computer Applications, 2019, 39(4): 1100-1105.
|
[6] |
LOU Mengying, YUAN Lisha, LIU Yaqin, WAN Xuemei, YANG Feng.
Palm vein enhancement method based on adaptive fusion
[J]. Journal of Computer Applications, 2019, 39(4): 1176-1182.
|
[7] |
WAN Yuan, ZHANG Jinghui, CHEN Zhiping, MENG Xiaojing.
Non-negative local sparse coding algorithm based on elastic net and histogram intersection
[J]. Journal of Computer Applications, 2019, 39(3): 706-711.
|
[8] |
NIU Ke, ZHANG Shuo, YANG Xiaoyuan.
Reversible data hiding scheme in encrypted videos based on vector histogram shifting
[J]. Journal of Computer Applications, 2019, 39(3): 756-762.
|
[9] |
LI Qi, YAN Bin, CHEN Na, YANG Hongmei.
3D medical image reversible watermarking algorithm based on unidirectional prediction error expansion
[J]. Journal of Computer Applications, 2019, 39(2): 483-487.
|
[10] |
ZHOU Chong, LIU Huan, ZHAO Ailing, ZHANG Pengcheng, LIU Yi, GUI Zhiguo.
Industrial X-ray image enhancement algorithm based on gradient field
[J]. Journal of Computer Applications, 2019, 39(10): 3088-3092.
|
[11] |
GUO Fangfang, CHAO Luomeng, ZHU Jianwen.
Multi-source data parallel preprocessing method based on similar connection
[J]. Journal of Computer Applications, 2019, 39(1): 57-60.
|
[12] |
ZHANG Ru, HUANG Fuhong, LIU Jianyi, ZHU Feng.
Trojan implantation method based on information hiding
[J]. Journal of Computer Applications, 2018, 38(8): 2267-2273.
|
[13] |
ZHENG Hongchang, WANG Chuntao, WANG Junxiang.
LASSO based image reversible watermarking
[J]. Journal of Computer Applications, 2018, 38(8): 2287-2292.
|
[14] |
BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong.
Information hiding algorithm based on fractal graph
[J]. Journal of Computer Applications, 2018, 38(8): 2306-2310.
|
[15] |
LI Tianxue, ZHANG Minqing, WANG Jianping, MA Shuangpeng.
Reversible data hiding algorithm based on pixel value order
[J]. Journal of Computer Applications, 2018, 38(8): 2311-2315.
|