[1] |
Xiaoyu LIU, Huaixin CHEN, Biyuan LIU, Ying LIN, Teng MA.
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold
[J]. Journal of Computer Applications, 2023, 43(1): 67-73.
|
[2] |
Chengxia XU, Qing YAN, Teng LI, Kaichao MIAO.
De-raining algorithm based on joint attention mechanism for single image
[J]. Journal of Computer Applications, 2022, 42(8): 2578-2585.
|
[3] |
Chunming TANG, Yuqing CHEN, Zidi ZHANG.
Improved consensus algorithm based on binomial swap forest and HotStuff
[J]. Journal of Computer Applications, 2022, 42(7): 2112-2117.
|
[4] |
Jingwen WU, Xinchun YIN, Jianting NING.
Traceable and revocable multi-authority attribute-based encryption scheme for vehicular ad hoc networks
[J]. Journal of Computer Applications, 2022, 42(6): 1695-1701.
|
[5] |
Haifeng LI, Bifan ZHAO, Jinyi HOU, Huaichao WANG, Zhongcheng GUI.
Automatic detection algorithm for underground target based on adaptive double threshold
[J]. Journal of Computer Applications, 2022, 42(4): 1275-1283.
|
[6] |
Quan YUAN, Shuxin XUE.
Relation extraction algorithm based on residual shrinkage network
[J]. Journal of Computer Applications, 2022, 42(10): 3040-3045.
|
[7] |
Shengwei XU, Jie KANG.
Multiparty quantum key agreement protocol based on logical single particle
[J]. Journal of Computer Applications, 2022, 42(1): 157-161.
|
[8] |
LIU Xiaoguang, JIN Shaokang, WEI Zihui, LIANG Tie, WANG Hongrui, LIU Xiuling.
Real-time fall detection method based on threshold and extremely randomized tree
[J]. Journal of Computer Applications, 2021, 41(9): 2761-2766.
|
[9] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[10] |
JIA Heming, LI Yao, JIANG Zichao, SUN Kangjian.
Multi-threshold segmentation of forest fire images based on modified symbiotic organisms search algorithm
[J]. Journal of Computer Applications, 2021, 41(5): 1465-1470.
|
[11] |
Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI.
Three-factor anonymous authentication and key agreement protocol
[J]. Journal of Computer Applications, 2021, 41(11): 3281-3287.
|
[12] |
ZHUO Yuxin, HAN Suya, ZHANG Yufeng, LI Zhiyao, DONG Yifeng.
Automatic segmentation method of microwave ablation region based on Nakagami parameters images of ultrasonic harmonic envelope
[J]. Journal of Computer Applications, 2021, 41(10): 3089-3096.
|
[13] |
WANG Sipeng, DU Changping, YE Zhixian, SONG Guanghua, ZHENG Yao.
Soft fault detection for flapping wing micro aerial vehicle based on multistep neural network observer
[J]. Journal of Computer Applications, 2020, 40(8): 2449-2454.
|
[14] |
ZHANG Haoran, WANG Xueyuan, LI Xiaoxia.
Low SNR denoising algorithm based on adaptive voice activity detection and minimum mean-square error log-spectral amplitude estimation
[J]. Journal of Computer Applications, 2020, 40(6): 1763-1768.
|
[15] |
WANG Zhongfeng, XU Zhiyuan, SONG Chunhe, ZHANG Hongyu, CAI Yingkai.
Gradient-based deep network pruning algorithm
[J]. Journal of Computer Applications, 2020, 40(5): 1253-1259.
|