| [1] |
Xiang WANG, Zhixiang CHEN, Guojun MAO.
Multivariate time series prediction method combining local and global correlation
[J]. Journal of Computer Applications, 2025, 45(9): 2806-2816.
|
| [2] |
Dengran REN, Shuying WANG.
Nested named entity recognition model for wind power equipment based on differential boundary enhancement
[J]. Journal of Computer Applications, 2025, 45(9): 2798-2805.
|
| [3] |
Li LI, Han SONG, Peihe LIU, Hanlin CHEN.
Named entity recognition for sensitive information based on data augmentation and residual networks
[J]. Journal of Computer Applications, 2025, 45(9): 2790-2797.
|
| [4] |
Yilin DENG, Fajiang YU.
Pseudo random number generator based on LSTM and separable self-attention mechanism
[J]. Journal of Computer Applications, 2025, 45(9): 2893-2901.
|
| [5] |
Jing YU, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN.
Sequence labeling optimization method combined with entity boundary offset
[J]. Journal of Computer Applications, 2025, 45(8): 2522-2529.
|
| [6] |
Lixiao ZHANG, Yao MA, Yuli YANG, Dan YU, Yongle CHEN.
Large-scale IoT binary component identification based on named entity recognition
[J]. Journal of Computer Applications, 2025, 45(7): 2288-2295.
|
| [7] |
Chen LIANG, Yisen WANG, Qiang WEI, Jiang DU.
Source code vulnerability detection method based on Transformer-GCN
[J]. Journal of Computer Applications, 2025, 45(7): 2296-2303.
|
| [8] |
Zhangjie XU, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN.
Nested named entity recognition combined with boundary generation by multi-objective learning
[J]. Journal of Computer Applications, 2025, 45(7): 2229-2236.
|
| [9] |
Xiaoqiang ZHAO, Yongyong LIU, Yongyong HUI, Kai LIU.
Batch process quality prediction model using improved time-domain convolutional network with multi-head self-attention mechanism
[J]. Journal of Computer Applications, 2025, 45(7): 2245-2252.
|
| [10] |
Jie HU, Shuaixing WU, Zhilan CAO, Yan ZHANG.
Named entity recognition model based on global information fusion and multi-dimensional relation perception
[J]. Journal of Computer Applications, 2025, 45(5): 1511-1519.
|
| [11] |
Hui LI, Bingzhi JIA, Chenxi WANG, Ziyu DONG, Jilong LI, Zhaoman ZHONG, Yanyan CHEN.
Generative adversarial network underwater image enhancement model based on Swin Transformer
[J]. Journal of Computer Applications, 2025, 45(5): 1439-1446.
|
| [12] |
Biqing ZENG, Guangbin ZHONG, James Zhiqing WEN.
Few-shot named entity recognition based on decomposed fuzzy span
[J]. Journal of Computer Applications, 2025, 45(5): 1504-1510.
|
| [13] |
Kunyuan JIANG, Xiaoxia LI, Li WANG, Yaodan CAO, Xiaoqiang ZHANG, Nan DING, Yingyue ZHOU.
Boundary-cross supervised semantic segmentation network with decoupled residual self-attention
[J]. Journal of Computer Applications, 2025, 45(4): 1120-1129.
|
| [14] |
Xiaoman WANG, Yanping CHEN, Caiwei YANG, Ruizhang HUANG, Yongbin QIN.
Nested named entity recognition method for multi-directional gradient feature extraction
[J]. Journal of Computer Applications, 2025, 45(11): 3547-3554.
|
| [15] |
Jintao FAN, Yanping CHEN, Caiwei YANG, Chuan LIN.
Nested named entity recognition by contrastive learning with boundary information
[J]. Journal of Computer Applications, 2025, 45(10): 3111-3120.
|