[1] |
Qi SHUAI, Hairui WANG, Guifu ZHU.
Chinese story ending generation model based on bidirectional contrastive training
[J]. Journal of Computer Applications, 2024, 44(9): 2683-2688.
|
[2] |
Shunyong LI, Shiyi LI, Rui XU, Xingwang ZHAO.
Incomplete multi-view clustering algorithm based on self-attention fusion
[J]. Journal of Computer Applications, 2024, 44(9): 2696-2703.
|
[3] |
Huanliang SUN, Siyi WANG, Junling LIU, Jingke XU.
Help-seeking information extraction model for flood event in social media data
[J]. Journal of Computer Applications, 2024, 44(8): 2437-2445.
|
[4] |
Lichao PANG, Xiaofeng WANG, Zhixin XIE, Yi YANG, Xingyu ZHAO, Lan YANG.
Solution cluster structure analysis of random regular 3-satisfiability problems
[J]. Journal of Computer Applications, 2024, 44(7): 2137-2143.
|
[5] |
Qing WANG, Jieyu ZHAO, Xulun YE, Nongxiao WANG.
Enhanced deep subspace clustering method with unified framework
[J]. Journal of Computer Applications, 2024, 44(7): 1995-2003.
|
[6] |
Yao DONG, Yixue FU, Yongfeng DONG, Jin SHI, Chen CHEN.
Survey of incomplete multi-view clustering
[J]. Journal of Computer Applications, 2024, 44(6): 1673-1682.
|
[7] |
Xiaoxia JIANG, Ruizhang HUANG, Ruina BAI, Lina REN, Yanping CHEN.
Deep event clustering method based on event representation and contrastive learning
[J]. Journal of Computer Applications, 2024, 44(6): 1734-1742.
|
[8] |
Tianyu HUANG, Yuanxing LI, Hao CHEN, Zijia GUO, Mingjun WEI.
User cluster partitioning method based on weighted fuzzy clustering in ground-air collaboration scenarios
[J]. Journal of Computer Applications, 2024, 44(5): 1555-1561.
|
[9] |
Lin GAO, Yu ZHOU, Tak Wu KWONG.
Evolutionary bi-level adaptive local feature selection
[J]. Journal of Computer Applications, 2024, 44(5): 1408-1414.
|
[10] |
Tongtong XU, Bin XIE, Chunhao ZHANG, Ximei ZHANG.
Multi-order nearest neighbor graph clustering algorithm by fusing transition probability matrix
[J]. Journal of Computer Applications, 2024, 44(5): 1527-1538.
|
[11] |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU.
Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
[J]. Journal of Computer Applications, 2024, 44(4): 1018-1026.
|
[12] |
Yu DING, Hanlin ZHANG, Rong LUO, Hua MENG.
Fuzzy clustering algorithm based on belief subcluster cutting
[J]. Journal of Computer Applications, 2024, 44(4): 1128-1138.
|
[13] |
Long CHEN, Xuanlin YU, Wen CHEN, Yi YAO, Wenjing ZHU, Ying JIA, Denghong LI, Zhi REN.
Efficient clustered routing protocol for intelligent road cone ad-hoc networks based on non-random clustering
[J]. Journal of Computer Applications, 2024, 44(3): 869-875.
|
[14] |
Lin SUN, Menghan LIU.
K-means clustering based on adaptive cuckoo optimization feature selection
[J]. Journal of Computer Applications, 2024, 44(3): 831-841.
|
[15] |
Chenghanyu ZHANG, Yuzhe LIN, Chengke TAN, Junfan WANG, Yeting GU, Zhekang DONG, Mingyu GAO.
New dish recognition network based on lightweight YOLOv5
[J]. Journal of Computer Applications, 2024, 44(2): 638-644.
|