[1] |
Guiyong LI, Bin HE, Lei FANG.
Key generation algorithm based on cyclic grouping of difference thresholds
[J]. Journal of Computer Applications, 2024, 44(7): 2110-2115.
|
[2] |
Jintao RAO, Zhe CUI.
Electronic voting scheme based on SM2 threshold blind signature
[J]. Journal of Computer Applications, 2024, 44(2): 512-518.
|
[3] |
Yaobin ZOU, Bin ZHANG.
Automatic thresholding method guided by maximizing four-directional weighted Shannon entropy
[J]. Journal of Computer Applications, 2024, 44(11): 3565-3573.
|
[4] |
Shaoquan CHEN, Jianping CAI, Lan SUN.
Differential privacy generative adversarial network algorithm with dynamic gradient threshold clipping
[J]. Journal of Computer Applications, 2023, 43(7): 2065-2072.
|
[5] |
Qian CHEN, Zheng CHAI, Zilong WANG, Jiawei CHEN.
Poisoning attack detection scheme based on generative adversarial network for federated learning
[J]. Journal of Computer Applications, 2023, 43(12): 3790-3798.
|
[6] |
Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU.
SM4 resistant differential power analysis lightweight threshold implementation
[J]. Journal of Computer Applications, 2023, 43(11): 3490-3496.
|
[7] |
LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng.
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold
[J]. Journal of Computer Applications, 2023, 43(1): 67-73.
|
[8] |
Chengxia XU, Qing YAN, Teng LI, Kaichao MIAO.
De-raining algorithm based on joint attention mechanism for single image
[J]. Journal of Computer Applications, 2022, 42(8): 2578-2585.
|
[9] |
Chunming TANG, Yuqing CHEN, Zidi ZHANG.
Improved consensus algorithm based on binomial swap forest and HotStuff
[J]. Journal of Computer Applications, 2022, 42(7): 2112-2117.
|
[10] |
Hanlun LI, Jianguo REN.
Malware propagation model based on characteristic behavior detection in P2P networks
[J]. Journal of Computer Applications, 2022, 42(7): 2125-2131.
|
[11] |
Haifeng LI, Bifan ZHAO, Jinyi HOU, Huaichao WANG, Zhongcheng GUI.
Automatic detection algorithm for underground target based on adaptive double threshold
[J]. Journal of Computer Applications, 2022, 42(4): 1275-1283.
|
[12] |
Quan YUAN, Shuxin XUE.
Relation extraction algorithm based on residual shrinkage network
[J]. Journal of Computer Applications, 2022, 42(10): 3040-3045.
|
[13] |
LIU Xiaoguang, JIN Shaokang, WEI Zihui, LIANG Tie, WANG Hongrui, LIU Xiuling.
Real-time fall detection method based on threshold and extremely randomized tree
[J]. Journal of Computer Applications, 2021, 41(9): 2761-2766.
|
[14] |
JIA Heming, LI Yao, JIANG Zichao, SUN Kangjian.
Multi-threshold segmentation of forest fire images based on modified symbiotic organisms search algorithm
[J]. Journal of Computer Applications, 2021, 41(5): 1465-1470.
|
[15] |
ZHUO Yuxin, HAN Suya, ZHANG Yufeng, LI Zhiyao, DONG Yifeng.
Automatic segmentation method of microwave ablation region based on Nakagami parameters images of ultrasonic harmonic envelope
[J]. Journal of Computer Applications, 2021, 41(10): 3089-3096.
|