[1] |
Qiye ZHANG, Xinrui ZENG.
Efficient active-set method for support vector data description problem with Gaussian kernel
[J]. Journal of Computer Applications, 2024, 44(12): 3808-3814.
|
[2] |
Yuhao TANG, Dezhong PENG, Zhong YUAN.
Fuzzy multi-granularity anomaly detection for incomplete mixed data
[J]. Journal of Computer Applications, 2024, 44(10): 3097-3104.
|
[3] |
Yuanjiang LI, Jinsheng QUAN, Yangyi TAN, Tian YANG.
Attribute reduction for high-dimensional data based on bi-view of similarity and difference
[J]. Journal of Computer Applications, 2023, 43(5): 1467-1472.
|
[4] |
Yan LI, Bin FAN, Jie GUO.
Attribute reduction algorithm based on cluster granulation and divergence among clusters
[J]. Journal of Computer Applications, 2022, 42(9): 2701-2712.
|
[5] |
Yiyang GUO, Jiong YU, Xusheng DU, Shaozhi YANG, Ming CAO.
Outlier detection algorithm based on autoencoder and ensemble learning
[J]. Journal of Computer Applications, 2022, 42(7): 2078-2087.
|
[6] |
Chao LIU, Lei WANG, Wen YANG, Qiangqiang ZHONG, Min LI.
Incremental attribute reduction method for set-valued decision information system with variable attribute sets
[J]. Journal of Computer Applications, 2022, 42(2): 463-468.
|
[7] |
Meng KANG, Zuqiang MENG.
Efficient attribute reduction algorithm based on local conditional discernibility
[J]. Journal of Computer Applications, 2022, 42(2): 449-456.
|
[8] |
MENG Fan, CHEN Guang, WANG Yong, GAO Yang, GAO Dequn, JIA Wenlong.
Multi-granularity temporal structure representation based outlier detection method for prediction of oil reservoir
[J]. Journal of Computer Applications, 2021, 41(8): 2453-2459.
|
[9] |
NING Jin, CHEN Leiting, LUO Zijuan, ZHOU Chuan, ZENG Huiru.
Evaluation metrics of outlier detection algorithms
[J]. Journal of Computer Applications, 2020, 40(9): 2622-2627.
|
[10] |
WANG Lei.
Network intrusion detection method based on improved rough set attribute reduction and K-means clustering
[J]. Journal of Computer Applications, 2020, 40(7): 1996-2002.
|
[11] |
DU Xusheng, YU Jiong, YE Lele, CHEN Jiaying.
Outlier detection algorithm based on graph random walk
[J]. Journal of Computer Applications, 2020, 40(5): 1322-1328.
|
[12] |
Xiajie ZHANG, Jinghua ZHU, Yang CHEN.
Distributed rough set attribute reduction algorithm under Spark
[J]. Journal of Computer Applications, 2020, 40(2): 518-523.
|
[13] |
OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian.
Intrusion detection method based on variable precision covering rough set
[J]. Journal of Computer Applications, 2020, 40(12): 3465-3470.
|
[14] |
LI Ziying, SHI Zhenguo.
Scheduling method for big data tasks
[J]. Journal of Computer Applications, 2020, 40(10): 2923-2928.
|
[15] |
BAO Di, ZHANG Nan, TONG Xiangrong, YUE Xiaodong.
Incremental attribute reduction algorithm of positive region in interval-valued decision tables
[J]. Journal of Computer Applications, 2019, 39(8): 2288-2296.
|