[1] |
Jiepo FANG, Chongben TAO.
Hybrid internet of vehicles intrusion detection system for zero-day attacks
[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769.
|
[2] |
Dong LIU, Chenhang LI, Changmao WU, Faxin RU, Yuanyuan XIA.
Automatic design of optical systems based on correctable reinforced search genetic algorithm
[J]. Journal of Computer Applications, 2024, 44(9): 2838-2847.
|
[3] |
Tingjie TANG, Jiajin HUANG, Jin QIN.
Session-based recommendation with graph auxiliary learning
[J]. Journal of Computer Applications, 2024, 44(9): 2711-2718.
|
[4] |
Yi LIU, Guoli YANG, Qibin ZHENG, Xiang LI, Yangsen ZHOU, Depeng CHEN.
Architecture design of data fusion pipeline for unmanned systems
[J]. Journal of Computer Applications, 2024, 44(8): 2536-2543.
|
[5] |
Tingjie TANG, Jiajin HUANG, Jin QIN, Hui LU.
Session-based recommendation based on graph co-occurrence enhanced multi-layer perceptron
[J]. Journal of Computer Applications, 2024, 44(8): 2357-2364.
|
[6] |
Huanhuan LI, Tianqiang HUANG, Xuemei DING, Haifeng LUO, Liqing HUANG.
Public traffic demand prediction based on multi-scale spatial-temporal graph convolutional network
[J]. Journal of Computer Applications, 2024, 44(7): 2065-2072.
|
[7] |
Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG.
Binary code identification based on user system call sequences
[J]. Journal of Computer Applications, 2024, 44(7): 2160-2167.
|
[8] |
Xu LI, Yulin HE, Laizhong CUI, Zhexue HUANG, Fournier‑Viger PHILIPPE.
Distributed observation point classifier for big data with random sample partition
[J]. Journal of Computer Applications, 2024, 44(6): 1727-1733.
|
[9] |
Jiong WANG, Taotao TANG, Caiyan JIA.
PAGCL: positive augmentation graph contrastive learning recommendation method without negative sampling
[J]. Journal of Computer Applications, 2024, 44(5): 1485-1492.
|
[10] |
Haoran WANG, Dan YU, Yuli YANG, Yao MA, Yongle CHEN.
Domain transfer intrusion detection method for unknown attacks on industrial control systems
[J]. Journal of Computer Applications, 2024, 44(4): 1158-1165.
|
[11] |
Ruixuan NI, Miao CAI, Baoliu YE.
DFS-Cache: memory-efficient and persistent client cache for distributed file systems
[J]. Journal of Computer Applications, 2024, 44(4): 1172-1180.
|
[12] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[13] |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU.
Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
[J]. Journal of Computer Applications, 2024, 44(4): 1018-1026.
|
[14] |
Yongfeng DONG, Jiaming BAI, Liqin WANG, Xu WANG.
Chinese named entity recognition combining prior knowledge and glyph features
[J]. Journal of Computer Applications, 2024, 44(3): 702-708.
|
[15] |
Zhaojun TANG, Meiyan XIA, Hua ZHANG, Ting XIE.
Fixed-time consensus of dynamic event-triggered multi-agent systems
[J]. Journal of Computer Applications, 2024, 44(3): 960-965.
|