[1] |
Longbo YAN, Wentao MAO, Zhihong ZHONG, Lilin FAN.
Robust unsupervised multi-task anomaly detection method for defect diagnosis of urban drainage pipe network
[J]. Journal of Computer Applications, 2025, 45(6): 1833-1840.
|
[2] |
Wenpeng WANG, Yinchang QIN, Wenxuan SHI.
Review of unsupervised deep learning methods for industrial defect detection
[J]. Journal of Computer Applications, 2025, 45(5): 1658-1670.
|
[3] |
Zihe CHEN, Bin CHEN.
Unsupervised point cloud anomaly detection based on multi-representation fusion
[J]. Journal of Computer Applications, 2025, 45(5): 1677-1685.
|
[4] |
Lihu PAN, Shouxin PENG, Rui ZHANG, Zhiyang XUE, Xuzhen MAO.
Video anomaly detection for moving foreground regions
[J]. Journal of Computer Applications, 2025, 45(4): 1300-1309.
|
[5] |
Zhenhua XUE, Qiang LI, Chao HUANG.
Vision foundation model-driven pixel-level image anomaly detection method
[J]. Journal of Computer Applications, 2025, 45(3): 823-831.
|
[6] |
Miaolei DENG, Yupei KAN, Chuanchuan SUN, Haihang XU, Shaojun FAN, Xin ZHOU.
Summary of network intrusion detection systems based on deep learning
[J]. Journal of Computer Applications, 2025, 45(2): 453-466.
|
[7] |
Zhiqiang REN, Xuebin CHEN.
FedAud: adaptive defense mechanism based on historical model updates
[J]. Journal of Computer Applications, 2025, 45(2): 490-496.
|
[8] |
Dixin WANG, Jiahao WANG, Min LI, Hao CHEN, Guangyao HU, Yu GONG.
Abnormal attack detection for underwater acoustic communication network
[J]. Journal of Computer Applications, 2025, 45(2): 526-533.
|
[9] |
Pengcheng SONG, Lijun GUO, Rong ZHANG.
Weakly supervised video anomaly detection with local-global temporal dependency
[J]. Journal of Computer Applications, 2025, 45(1): 240-246.
|
[10] |
Tingwei CHEN, Jiacheng ZHANG, Junlu WANG.
Random validation blockchain construction for federated learning
[J]. Journal of Computer Applications, 2024, 44(9): 2770-2776.
|
[11] |
Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG.
Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU
[J]. Journal of Computer Applications, 2024, 44(8): 2493-2499.
|
[12] |
Yuhan LIU, Genlin JI, Hongping ZHANG.
Video pedestrian anomaly detection method based on skeleton graph and mixed attention
[J]. Journal of Computer Applications, 2024, 44(8): 2551-2557.
|
[13] |
Qing WANG, Jieyu ZHAO, Xulun YE, Nongxiao WANG.
Enhanced deep subspace clustering method with unified framework
[J]. Journal of Computer Applications, 2024, 44(7): 1995-2003.
|
[14] |
Xinrui LIN, Xiaofei WANG, Yan ZHU.
Academic anomaly citation group detection based on local extended community detection
[J]. Journal of Computer Applications, 2024, 44(6): 1855-1861.
|
[15] |
Fan MENG, Qunli YANG, Jing HUO, Xinkuan WANG.
EraseMTS: iterative active multivariable time series anomaly detection algorithm based on margin anomaly candidate set
[J]. Journal of Computer Applications, 2024, 44(5): 1458-1463.
|