[1] |
Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO.
Application of improved hunter-prey optimization algorithm in WSN coverage
[J]. Journal of Computer Applications, 2024, 44(8): 2506-2513.
|
[2] |
Han SHEN, Zhongsheng WANG, Zhou ZHOU, Changyuan WANG.
Improved DV-Hop localization model based on multi-scenario
[J]. Journal of Computer Applications, 2024, 44(4): 1219-1227.
|
[3] |
Qiye ZHANG, Xinrui ZENG.
Efficient active-set method for support vector data description problem with Gaussian kernel
[J]. Journal of Computer Applications, 2024, 44(12): 3808-3814.
|
[4] |
Xuebin CHEN, Liyang SHAN, Rumin GUO.
Review of histogram publication methods based on differential privacy
[J]. Journal of Computer Applications, 2024, 44(10): 3114-3121.
|
[5] |
Yuhao TANG, Dezhong PENG, Zhong YUAN.
Fuzzy multi-granularity anomaly detection for incomplete mixed data
[J]. Journal of Computer Applications, 2024, 44(10): 3097-3104.
|
[6] |
Dahai LI, Meixin ZHAN, Zhendong WANG.
Enhanced sparrow search algorithm based on multiple improvement strategies
[J]. Journal of Computer Applications, 2023, 43(9): 2845-2854.
|
[7] |
Li WANG, Shibin XUAN, Xuyang QIN, Ziwei LI.
Multi-object tracking method based on dual-decoder Transformer
[J]. Journal of Computer Applications, 2023, 43(6): 1919-1929.
|
[8] |
Lei LIU, Peng WU, Kai XIE, Beizhi CHENG, Guanqun SHENG.
Parking space detection method based on self-supervised learning HOG prediction auxiliary task
[J]. Journal of Computer Applications, 2023, 43(12): 3933-3940.
|
[9] |
Zhe WANG, Qiming WANG, Taoshen LI, Lina GE.
Joint optimization method for SWIPT edge network based on deep reinforcement learning
[J]. Journal of Computer Applications, 2023, 43(11): 3540-3550.
|
[10] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[11] |
Hongliang TIAN, Jiayue WANG, Chenxi LI.
Data storage scheme based on hybrid algorithm blockchain and node identity authentication
[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
|
[12] |
Yiyang GUO, Jiong YU, Xusheng DU, Shaozhi YANG, Ming CAO.
Outlier detection algorithm based on autoencoder and ensemble learning
[J]. Journal of Computer Applications, 2022, 42(7): 2078-2087.
|
[13] |
Shangwang LIU, Xinming ZHANG, Fei ZHANG.
Image character editing method based on improved font adaptive neural network
[J]. Journal of Computer Applications, 2022, 42(7): 2227-2238.
|
[14] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[15] |
Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG.
High-capacity reversible data hiding in encrypted videos based on histogram shifting
[J]. Journal of Computer Applications, 2022, 42(11): 3633-3638.
|