[1] |
Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG.
Efficient reversible data hiding scheme based on two-dimensional modulo operations
[J]. Journal of Computer Applications, 2024, 44(6): 1880-1888.
|
[2] |
Shengyou ZHENG, Yanxiang CHEN, Zuxing ZHAO, Haiyang LIU.
Construction and benchmark detection of multimodal partial forgery dataset
[J]. Journal of Computer Applications, 2024, 44(10): 3134-3140.
|
[3] |
Zongzhe LYU, Hui XU, Xiao YANG, Yong WANG, Weijian WANG.
Small object detection algorithm of YOLOv5 for safety helmet
[J]. Journal of Computer Applications, 2023, 43(6): 1943-1949.
|
[4] |
Bo YANG, Zongtao DUAN, Pengfei ZUO, Yuanyuan XIAO, Yilin WANG.
Accident prediction model fusing heterogeneous traffic situations
[J]. Journal of Computer Applications, 2023, 43(11): 3625-3631.
|
[5] |
Jin ZHANG, Peiqi QU, Cheng SUN, Meng LUO.
Safety helmet wearing detection algorithm based on improved YOLOv5
[J]. Journal of Computer Applications, 2022, 42(4): 1292-1300.
|
[6] |
Hongwei GUO, Xiangsuo FAN, Shuai LIU, Xiang WEI, Lingli ZHAO.
Video coding optimization algorithm based on rate-distortion characteristic
[J]. Journal of Computer Applications, 2022, 42(3): 946-952.
|
[7] |
JIANG Lin, SHI Jiaqi, LI Yuancheng.
Parallel design and implementation of synthetic view distortion change algorithm in reconfigurable structure
[J]. Journal of Computer Applications, 2021, 41(6): 1734-1740.
|
[8] |
QIN Li, HAO Zhigang, LI Guoliang.
Construction and correlation analysis of national food safety standard graph
[J]. Journal of Computer Applications, 2021, 41(4): 1005-1011.
|
[9] |
QIN Nan, MA Liang, HUANG Rui.
Software safety requirement analysis and verification method based on system theoretic process analysis
[J]. Journal of Computer Applications, 2020, 40(11): 3261-3266.
|
[10] |
TONG Xinchi, ZHANG Huajun, GUO Hang.
Multi-directional path planning algorithm for unmanned surface vehicle
[J]. Journal of Computer Applications, 2020, 40(11): 3373-3378.
|
[11] |
XU Yansheng, ZHANG Youjie.
Order preserving encryption scheme of nonlinear mapping based on random function
[J]. Journal of Computer Applications, 2020, 40(10): 2986-2991.
|
[12] |
MA Qinglu, ZOU Zheng.
Cloud monitoring system of tunnel groups for traffic safety
[J]. Journal of Computer Applications, 2019, 39(5): 1490-1494.
|
[13] |
WANG Peng, WU Kang, YAN Fang, WANG Kenian, ZHANG Xiaochen.
Security verification method of safety critical software based on system theoretic process analysis
[J]. Journal of Computer Applications, 2019, 39(11): 3298-3303.
|
[14] |
ZHOU Yizhao, WANG Xiaodong, ZHANG Lianjun, LAN Qiongqiong.
Selective encryption scheme based on Logistic and Arnold transform in high efficiency video coding
[J]. Journal of Computer Applications, 2019, 39(10): 2973-2979.
|
[15] |
LI Zhuo, XU Zhe, CHEN Xin, LI Shuqin.
Embedded real-time compression for hyper-spectral images based on KLT and HEVC
[J]. Journal of Computer Applications, 2018, 38(8): 2393-2397.
|