[1] |
Jie HU, Qiyang ZHENG, Jun SUN, Yan ZHANG.
Multi-label classification model based on multi-label relational graph and local dynamic reconstruction learning
[J]. Journal of Computer Applications, 2025, 45(4): 1104-1112.
|
[2] |
Liwei ZHANG, Quan LIANG, Yutao HU, Qiaole ZHU.
Channel shuffle attention mechanism based on group convolution
[J]. Journal of Computer Applications, 2025, 45(4): 1069-1076.
|
[3] |
Kunyuan JIANG, Xiaoxia LI, Li WANG, Yaodan CAO, Xiaoqiang ZHANG, Nan DING, Yingyue ZHOU.
Boundary-cross supervised semantic segmentation network with decoupled residual self-attention
[J]. Journal of Computer Applications, 2025, 45(4): 1120-1129.
|
[4] |
Malei SHEN, Zhicai SHI, Yongbin GAO, Jianyang HU.
Fact verification of semantic fusion collaborative reasoning based on graph embedding
[J]. Journal of Computer Applications, 2025, 45(4): 1184-1189.
|
[5] |
Liqin WANG, Zhilei GENG, Yingshuang LI, Yongfeng DONG, Meng BIAN.
Open-world knowledge reasoning model based on path and enhanced triplet text
[J]. Journal of Computer Applications, 2025, 45(4): 1177-1183.
|
[6] |
Chun XU, Shuangyan JI, Huan MA, Enwei SUN, Mengmeng WANG, Mingyu SU.
Consultation recommendation method based on knowledge graph and dialogue structure
[J]. Journal of Computer Applications, 2025, 45(4): 1157-1168.
|
[7] |
Shiyue GUO, Jianwu DANG, Yangping WANG, Jiu YONG.
3D hand pose estimation combining attention mechanism and multi-scale feature fusion
[J]. Journal of Computer Applications, 2025, 45(4): 1293-1299.
|
[8] |
Haijun GENG, Yun DONG, Zhiguo HU, Haotian CHI, Jing YANG, Xia YIN.
Encrypted traffic classification method based on Attention-1DCNN-CE
[J]. Journal of Computer Applications, 2025, 45(3): 872-882.
|
[9] |
Yalun WANG, Yangsen ZHANG, Siwen ZHU.
Headline generation model with position embedding for knowledge reasoning
[J]. Journal of Computer Applications, 2025, 45(2): 345-353.
|
[10] |
Hong SHANGGUAN, Huiying REN, Xiong ZHANG, Xinglong HAN, Zhiguo GUI, Yanling WANG.
Low-dose CT denoising model based on dual encoder-decoder generative adversarial network
[J]. Journal of Computer Applications, 2025, 45(2): 624-632.
|
[11] |
Tianqi ZHANG, Shuang TAN, Xiwen SHEN, Juan TANG.
Image watermarking method combining attention mechanism and multi-scale feature
[J]. Journal of Computer Applications, 2025, 45(2): 616-623.
|
[12] |
Dixin WANG, Jiahao WANG, Min LI, Hao CHEN, Guangyao HU, Yu GONG.
Abnormal attack detection for underwater acoustic communication network
[J]. Journal of Computer Applications, 2025, 45(2): 526-533.
|
[13] |
Dongmei XIE, Xinye BIAN, Lianfei YU, Wenbo LIU, Ziling WANG, Zhijian QU, Jiafeng YU.
DeepsORF: coding sORFs prediction method based on graph coding with improved flow attention
[J]. Journal of Computer Applications, 2025, 45(2): 546-555.
|
[14] |
Jiayang GUI, Shunji WANG, Zhengkang ZHOU, Jiashan TANG.
Tunnel foreign object detection algorithm based on improved YOLOv8n
[J]. Journal of Computer Applications, 2025, 45(2): 655-661.
|
[15] |
Haiteng MENG, Xiaole ZHAO, Tianrui LI.
Lightweight image super-resolution reconstruction based on asymmetric information distillation network
[J]. Journal of Computer Applications, 2025, 45(2): 601-609.
|