[1] |
Shunyong LI, Shiyi LI, Rui XU, Xingwang ZHAO.
Incomplete multi-view clustering algorithm based on self-attention fusion
[J]. Journal of Computer Applications, 2024, 44(9): 2696-2703.
|
[2] |
Tingwei CHEN, Jiacheng ZHANG, Junlu WANG.
Random validation blockchain construction for federated learning
[J]. Journal of Computer Applications, 2024, 44(9): 2770-2776.
|
[3] |
Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG.
Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU
[J]. Journal of Computer Applications, 2024, 44(8): 2493-2499.
|
[4] |
Yuhan LIU, Genlin JI, Hongping ZHANG.
Video pedestrian anomaly detection method based on skeleton graph and mixed attention
[J]. Journal of Computer Applications, 2024, 44(8): 2551-2557.
|
[5] |
Qing WANG, Jieyu ZHAO, Xulun YE, Nongxiao WANG.
Enhanced deep subspace clustering method with unified framework
[J]. Journal of Computer Applications, 2024, 44(7): 1995-2003.
|
[6] |
Xinrui LIN, Xiaofei WANG, Yan ZHU.
Academic anomaly citation group detection based on local extended community detection
[J]. Journal of Computer Applications, 2024, 44(6): 1855-1861.
|
[7] |
Yao DONG, Yixue FU, Yongfeng DONG, Jin SHI, Chen CHEN.
Survey of incomplete multi-view clustering
[J]. Journal of Computer Applications, 2024, 44(6): 1673-1682.
|
[8] |
Xiaoxia JIANG, Ruizhang HUANG, Ruina BAI, Lina REN, Yanping CHEN.
Deep event clustering method based on event representation and contrastive learning
[J]. Journal of Computer Applications, 2024, 44(6): 1734-1742.
|
[9] |
Tianyu HUANG, Yuanxing LI, Hao CHEN, Zijia GUO, Mingjun WEI.
User cluster partitioning method based on weighted fuzzy clustering in ground-air collaboration scenarios
[J]. Journal of Computer Applications, 2024, 44(5): 1555-1561.
|
[10] |
Lin GAO, Yu ZHOU, Tak Wu KWONG.
Evolutionary bi-level adaptive local feature selection
[J]. Journal of Computer Applications, 2024, 44(5): 1408-1414.
|
[11] |
Fan MENG, Qunli YANG, Jing HUO, Xinkuan WANG.
EraseMTS: iterative active multivariable time series anomaly detection algorithm based on margin anomaly candidate set
[J]. Journal of Computer Applications, 2024, 44(5): 1458-1463.
|
[12] |
Tongtong XU, Bin XIE, Chunhao ZHANG, Ximei ZHANG.
Multi-order nearest neighbor graph clustering algorithm by fusing transition probability matrix
[J]. Journal of Computer Applications, 2024, 44(5): 1527-1538.
|
[13] |
Zimeng ZHU, Zhixin LI, Zhan HUAN, Ying CHEN, Jiuzhen LIANG.
Weakly supervised video anomaly detection based on triplet-centered guidance
[J]. Journal of Computer Applications, 2024, 44(5): 1452-1457.
|
[14] |
Yu DING, Hanlin ZHANG, Rong LUO, Hua MENG.
Fuzzy clustering algorithm based on belief subcluster cutting
[J]. Journal of Computer Applications, 2024, 44(4): 1128-1138.
|
[15] |
Long CHEN, Xuanlin YU, Wen CHEN, Yi YAO, Wenjing ZHU, Ying JIA, Denghong LI, Zhi REN.
Efficient clustered routing protocol for intelligent road cone ad-hoc networks based on non-random clustering
[J]. Journal of Computer Applications, 2024, 44(3): 869-875.
|