[1] |
Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO.
Application of improved hunter-prey optimization algorithm in WSN coverage
[J]. Journal of Computer Applications, 2024, 44(8): 2506-2513.
|
[2] |
Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Coverage-guided fuzzing based on adaptive sensitive region mutation
[J]. Journal of Computer Applications, 2024, 44(8): 2528-2535.
|
[3] |
Han SHEN, Zhongsheng WANG, Zhou ZHOU, Changyuan WANG.
Improved DV-Hop localization model based on multi-scenario
[J]. Journal of Computer Applications, 2024, 44(4): 1219-1227.
|
[4] |
Xiuxi WEI, Maosong PENG, Huajuan HUANG.
Node coverage optimization of wireless sensor network based on multi-strategy improved butterfly optimization algorithm
[J]. Journal of Computer Applications, 2024, 44(4): 1009-1017.
|
[5] |
Haixin HUANG, Guangwei YU, Shoushan CHENG, Chunming LI.
Full coverage path planning of bridge inspection wall-climbing robot based on improved grey wolf optimization
[J]. Journal of Computer Applications, 2024, 44(3): 966-971.
|
[6] |
Yanran SHEN, Xin WEN, Jinhao ZHANG, Shuai ZHANG, Rui CAO, Baolu GAO.
fMRI brain age prediction model with lightweight multi-scale convolutional network
[J]. Journal of Computer Applications, 2024, 44(12): 3949-3957.
|
[7] |
Dahai LI, Meixin ZHAN, Zhendong WANG.
Enhanced sparrow search algorithm based on multiple improvement strategies
[J]. Journal of Computer Applications, 2023, 43(9): 2845-2854.
|
[8] |
Ming DU, Wanli GU, Junfeng ZHOU, Zhijun WANG.
Community search method based on motif connectivity
[J]. Journal of Computer Applications, 2023, 43(7): 2190-2199.
|
[9] |
Zhongbo HU, Xupeng WANG.
Multifactorial backtracking search optimization algorithm for solving automated test case generation problem
[J]. Journal of Computer Applications, 2023, 43(4): 1214-1219.
|
[10] |
Zhe WANG, Qiming WANG, Taoshen LI, Lina GE.
Joint optimization method for SWIPT edge network based on deep reinforcement learning
[J]. Journal of Computer Applications, 2023, 43(11): 3540-3550.
|
[11] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[12] |
YANG Dong, WANG Yisong.
Structural testing methods of disjunctive answer set programs
[J]. Journal of Computer Applications, 2023, 43(1): 215-220.
|
[13] |
Hongliang TIAN, Jiayue WANG, Chenxi LI.
Data storage scheme based on hybrid algorithm blockchain and node identity authentication
[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
|
[14] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[15] |
Jie YANG, Mingyang ZHANG, Xiaobin RUI, Zhixiao WANG.
Influence maximization algorithm based on node coverage and structural hole
[J]. Journal of Computer Applications, 2022, 42(4): 1155-1161.
|