[1] |
Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG.
Deep network compression method based on low-rank decomposition and vector quantization
[J]. Journal of Computer Applications, 2024, 44(7): 1987-1994.
|
[2] |
Yuan TANG, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN.
Relation extraction model based on multi-scale hybrid attention convolutional neural networks
[J]. Journal of Computer Applications, 2024, 44(7): 2011-2017.
|
[3] |
Feiyu ZHAI, Handa MA.
Hybrid classical-quantum classification model based on DenseNet
[J]. Journal of Computer Applications, 2024, 44(6): 1905-1910.
|
[4] |
Zhengyu ZHAO, Jing LUO, Xinhui TU.
Information retrieval method based on multi-granularity semantic fusion
[J]. Journal of Computer Applications, 2024, 44(6): 1775-1780.
|
[5] |
Min SUN, Qian CHENG, Xining DING.
CBAM-CGRU-SVM based malware detection method for Android
[J]. Journal of Computer Applications, 2024, 44(5): 1539-1545.
|
[6] |
Boyue WANG, Yingxiang LI, Jiandan ZHONG.
Segmentation network for day and night ground-based cloud images based on improved Res-UNet
[J]. Journal of Computer Applications, 2024, 44(4): 1310-1316.
|
[7] |
Zexuan WAN, Chunli XIE, Quanrun LYU, Yao LIANG.
Code clone detection based on dependency enhanced hierarchical abstract syntax tree
[J]. Journal of Computer Applications, 2024, 44(4): 1259-1268.
|
[8] |
Pengfei ZHANG, Litao HAN, Hengjian FENG, Hongmei LI.
Point cloud semantic segmentation based on attention mechanism and global feature optimization
[J]. Journal of Computer Applications, 2024, 44(4): 1086-1092.
|
[9] |
Wei LI, Ling CHEN, Xiuyuan XU, Min ZHU, Jixiang GUO, Kai ZHOU, Hao NIU, Yuchen ZHANG, Shanye YI, Yi ZHANG, Fengming LUO.
Interstitial lung disease segmentation algorithm based on multi-task learning
[J]. Journal of Computer Applications, 2024, 44(4): 1285-1293.
|
[10] |
Bin XIAO, Mo YANG, Min WANG, Guangyuan QIN, Huan LI.
Domain generalization method of phase-frequency fusion from independent perspective
[J]. Journal of Computer Applications, 2024, 44(4): 1002-1009.
|
[11] |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU.
Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
[J]. Journal of Computer Applications, 2024, 44(4): 1018-1026.
|
[12] |
Lei GUO, Zhen JIA, Tianrui LI.
Relational and interactive graph attention network for aspect-level sentiment analysis
[J]. Journal of Computer Applications, 2024, 44(3): 696-701.
|
[13] |
Xue LI, Guangle YAO, Honghui WANG, Jun LI, Haoran ZHOU, Shaoze YE.
Remote sensing image classification based on sample incremental learning
[J]. Journal of Computer Applications, 2024, 44(3): 732-736.
|
[14] |
Zhongchen YUAN, Zongmin MA.
UMCS tree based hybrid similarity measure of UML class diagram
[J]. Journal of Computer Applications, 2024, 44(3): 883-889.
|
[15] |
Ning WU, Yangyang LUO, Huajie XU.
Semantic segmentation method for remote sensing images based on multi-scale feature fusion
[J]. Journal of Computer Applications, 2024, 44(3): 737-744.
|