[1] |
Jiepo FANG, Chongben TAO.
Hybrid internet of vehicles intrusion detection system for zero-day attacks
[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769.
|
[2] |
Zixuan YUAN, Xiaoqing WENG, Ningzhen GE.
Early classification model of multivariate time series based on orthogonal locality preserving projection and cost optimization
[J]. Journal of Computer Applications, 2024, 44(6): 1832-1841.
|
[3] |
Xu LI, Yulin HE, Laizhong CUI, Zhexue HUANG, Fournier‑Viger PHILIPPE.
Distributed observation point classifier for big data with random sample partition
[J]. Journal of Computer Applications, 2024, 44(6): 1727-1733.
|
[4] |
Min SUN, Qian CHENG, Xining DING.
CBAM-CGRU-SVM based malware detection method for Android
[J]. Journal of Computer Applications, 2024, 44(5): 1539-1545.
|
[5] |
Wei LI, Ling CHEN, Xiuyuan XU, Min ZHU, Jixiang GUO, Kai ZHOU, Hao NIU, Yuchen ZHANG, Shanye YI, Yi ZHANG, Fengming LUO.
Interstitial lung disease segmentation algorithm based on multi-task learning
[J]. Journal of Computer Applications, 2024, 44(4): 1285-1293.
|
[6] |
Keyi FU, Gaocai WANG, Man WU.
Few-shot object detection method based on improved region proposal network and feature aggregation
[J]. Journal of Computer Applications, 2024, 44(12): 3790-3797.
|
[7] |
Enbao QIAO, Xiangyang GAO, Jun CHENG.
Self-recovery adaptive Monte Carlo localization algorithm based on support vector machine
[J]. Journal of Computer Applications, 2024, 44(10): 3246-3251.
|
[8] |
Xueyu HUANG, Huaiyu HE, Huimin LIN, Jinshui CHEN.
Classification and recognition method of copper alloy metallograph based on feature aggregation
[J]. Journal of Computer Applications, 2023, 43(8): 2593-2601.
|
[9] |
Yinjiang CAI, Guangjun XU, Xibo MA.
Data enhancement method for drugs under graph-structured representation
[J]. Journal of Computer Applications, 2023, 43(4): 1136-1141.
|
[10] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[11] |
Jici ZHANG, Chunlong FAN, Cailong LI, Xuedong ZHENG.
Cross-model universal perturbation generation method based on geometric relationship
[J]. Journal of Computer Applications, 2023, 43(11): 3428-3435.
|
[12] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[13] |
Jian ZHANG, Peiyuan CHENG, Siyu SHAO.
Rotary machine fault diagnosis based on improved residual convolutional auto-encoding network and class adaptation
[J]. Journal of Computer Applications, 2022, 42(8): 2440-2449.
|
[14] |
Liang ZHU, Hua XU, Jinhai CHENG, Shen ZHU.
Analysis and improvement of AdaBoost’s sample weight and combination coefficient
[J]. Journal of Computer Applications, 2022, 42(7): 2022-2029.
|
[15] |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG.
Intrusion detection system with dynamic weight loss function based on internet of things platform
[J]. Journal of Computer Applications, 2022, 42(7): 2118-2124.
|