[1] |
Yeheng LI, Guangsheng LUO, Qianmin SU.
Logo detection algorithm based on improved YOLOv5
[J]. Journal of Computer Applications, 2024, 44(8): 2580-2587.
|
[2] |
Zhe KONG, Han LI, Shaowei GAN, Mingru KONG, Bingtao HE, Ziyu GUO, Ducheng JIN, Zhaowen QIU.
Structure segmentation model for 3D kidney images based on asymmetric multi-decoder and attention module
[J]. Journal of Computer Applications, 2024, 44(7): 2216-2224.
|
[3] |
Min SUN, Qian CHENG, Xining DING.
CBAM-CGRU-SVM based malware detection method for Android
[J]. Journal of Computer Applications, 2024, 44(5): 1539-1545.
|
[4] |
Bin XIAO, Yun GAN, Min WANG, Xingpeng ZHANG, Zhaoxing WANG.
Network abnormal traffic detection based on port attention and convolutional block attention module
[J]. Journal of Computer Applications, 2024, 44(4): 1027-1034.
|
[5] |
Qiaoling HUANG, Bochuan ZHENG, Zicheng DING, Zedong WU.
Improved image inpainting network incorporating supervised attention module and cross-stage feature fusion
[J]. Journal of Computer Applications, 2024, 44(2): 572-579.
|
[6] |
Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity authentication scheme based on certificate-less signcryption
[J]. Journal of Computer Applications, 2024, 44(12): 3731-3740.
|
[7] |
Han WANG, Lasheng ZHAO, Qiang ZHANG, Yinqing CHENG, Zepeng QIU.
Dual branch synthetic speech detection based on attention and squeeze-excitation inception
[J]. Journal of Computer Applications, 2024, 44(10): 3217-3222.
|
[8] |
Jianyang CUI, Ying CAI, Yu ZHANG, Yanfang FAN.
Authenticatable privacy-preserving scheme based on signcryption from lattice for vehicular ad hoc network
[J]. Journal of Computer Applications, 2024, 44(1): 233-241.
|
[9] |
Jie LONG, Liang XIE, Haijiao XU.
Integrated deep reinforcement learning portfolio model
[J]. Journal of Computer Applications, 2024, 44(1): 300-310.
|
[10] |
Chunlan ZHAN, Anzhi WANG, Minghui WANG.
Camouflage object segmentation method based on channel attention and edge fusion
[J]. Journal of Computer Applications, 2023, 43(7): 2166-2172.
|
[11] |
Yiyu GUO, Luoyu ZHOU, Xinyu LIU, Yao LI.
Dangerous goods detection method in elevator scene based on improved attention mechanism
[J]. Journal of Computer Applications, 2023, 43(7): 2295-2302.
|
[12] |
Jie SUN, Shaoxin WU, Xuejun WANG, Jing HUA.
Efficient person search algorithm and optimization with Sophon SC5+ chip architecture
[J]. Journal of Computer Applications, 2023, 43(3): 744-751.
|
[13] |
Feiyu LIAN, Liang ZHANG, Jiedong WANG, Yukang JIN, Yu CHAI.
Outdoor scene point cloud segmentation model based on graph model and attention mechanism
[J]. Journal of Computer Applications, 2023, 43(12): 3911-3917.
|
[14] |
Jionghuan CHEN, Shengli BAO, Xiaofei WANG, Ruofan LI.
Genotype imputation algorithm fusing convolution and self-attention mechanism
[J]. Journal of Computer Applications, 2023, 43(11): 3534-3539.
|
[15] |
Jun MA, Zhen YAO, Cuifeng XU, Shouhong CHEN.
Multi-UAV real-time tracking algorithm based on improved PP-YOLO and Deep-SORT
[J]. Journal of Computer Applications, 2022, 42(9): 2885-2892.
|