[1] |
Xiao CHEN, Yan CHANG, Danchen WANG, Shibin ZHANG.
Low-cost adversarial example defense algorithm based on example preprocessing
[J]. Journal of Computer Applications, 2024, 44(9): 2756-2762.
|
[2] |
Hongtao SONG, Jiangsheng YU, Qilong HAN.
Industrial multivariate time series data quality assessment method
[J]. Journal of Computer Applications, 2024, 44(6): 1743-1750.
|
[3] |
Weipeng JING, Qingxin XIAO, Hui LUO.
Channel compensation algorithm for speaker recognition based on probabilistic spherical discriminant analysis
[J]. Journal of Computer Applications, 2024, 44(2): 556-562.
|
[4] |
Xiang GUO, Wengang JIANG, Yuhang WANG.
Encrypted traffic classification method based on improved Inception-ResNet
[J]. Journal of Computer Applications, 2023, 43(8): 2471-2476.
|
[5] |
Lei LI, Guofu ZHANG, Zhaopin SU, Feng YUE.
Software testing resource allocation algorithm for dynamic changes in architecture
[J]. Journal of Computer Applications, 2023, 43(7): 2261-2270.
|
[6] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[7] |
Tingping ZHANG, Cong SHUAI, Jianxi YANG, Junzhi ZOU, Chaoshun YU, Lifang DU.
Re-identification of vehicles based on joint stripe relations
[J]. Journal of Computer Applications, 2022, 42(6): 1884-1891.
|
[8] |
Changyin LUO, Junyu WANG, Xuebin CHEN, Chundi MA, Shufen ZHANG.
Improved federated weighted average algorithm
[J]. Journal of Computer Applications, 2022, 42(4): 1131-1136.
|
[9] |
Fangxin NIE, Yujia WANG, Xin JIA.
Teaching and learning information interactive particle swarm optimization algorithm
[J]. Journal of Computer Applications, 2022, 42(3): 874-882.
|
[10] |
Yaoming MA, Yu ZHANG.
Insulator detection algorithm based on improved Faster-RCNN
[J]. Journal of Computer Applications, 2022, 42(2): 631-637.
|
[11] |
GAN Lan, SHEN Hongfei, WANG Yao, ZHANG Yuejin.
Data augmentation method based on improved deep convolutional generative adversarial networks
[J]. Journal of Computer Applications, 2021, 41(5): 1305-1313.
|
[12] |
JIANG Kaolin, BAI Wei, ZHANG Lei, CHEN Jun, PAN Zhisong, GUO Shize.
Malicious code detection based on multi-channel image deep learning
[J]. Journal of Computer Applications, 2021, 41(4): 1142-1147.
|
[13] |
HE Jiean, WU Xiaohong, HE Xiaohai, HU Jianrong, QIN Linbo.
Imperfect wheat kernel recognition combined with image enhancement and conventional neural network
[J]. Journal of Computer Applications, 2021, 41(3): 911-916.
|
[14] |
LOU Mengying, WANG Tianjing, LIU Yaqin, YANG Feng, HUANG Jing.
Palm vein image recognition based on side chain connected convolution neural network
[J]. Journal of Computer Applications, 2020, 40(12): 3673-3678.
|
[15] |
HUANG Yongxin, TANG Xuefei.
Discovery of functional dependencies in university data based on affinity propagation clustering and TANE algorithms
[J]. Journal of Computer Applications, 2020, 40(1): 90-95.
|