[1] |
Wu Zongyou, Bai Kunlong, Yang Linrui, Wang Yiqi, Tian Yingjie.
Review on Text Mining of Electronic Medical Record
[J]. Journal of Computer Research and Development, 2021, 58(3): 513-527.
|
[2] |
Chen Jinyin, Chen Yipeng, Chen Yiming, Zheng Haibin, Ji Shouling, Shi Jie, Cheng Yao.
Fairness Research on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(2): 264-280.
|
[3] |
Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan.
Fault Detection Context Based Equivalent Mutant Identification Algorithm
[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97.
|
[4] |
Li Shuangfeng.
TensorFlow Lite: On-Device Machine Learning Framework
[J]. Journal of Computer Research and Development, 2020, 57(9): 1839-1853.
|
[5] |
Chen Kerui, Meng Xiaofeng.
Interpretation and Understanding in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(9): 1971-1986.
|
[6] |
Ding Chengcheng, Tao Wei, Tao Qing.
A Unified Momentum Method with Triple-Parameters and Its Optimal Convergence Rate
[J]. Journal of Computer Research and Development, 2020, 57(8): 1571-1580.
|
[7] |
He Yixiao, Pang Ming, Jiang Yuan.
Mondrian Deep Forest
[J]. Journal of Computer Research and Development, 2020, 57(8): 1594-1604.
|
[8] |
Li Dongmei, Zhang Yang, Li Dongyuan, Lin Danqiong.
Review of Entity Relation Extraction Methods
[J]. Journal of Computer Research and Development, 2020, 57(7): 1424-1448.
|
[9] |
Tao Tao, Sun Yu’e, Chen Dongmei, Yang Wenjian, Huang He, Luo Yonglong.
A Method of Map Outlines Generation Based on Smartphone Sensor Data
[J]. Journal of Computer Research and Development, 2020, 57(7): 1490-1507.
|
[10] |
Lan Tian, Peng Chuan, Li Sen, Ye Wenzheng, Li Meng, Hui Guoqiang, Lü Yilan, Qian Yuxin, Liu Qiao.
An Overview of Monaural Speech Denoising and Dereverberation Research
[J]. Journal of Computer Research and Development, 2020, 57(5): 928-953.
|
[11] |
Liu Chenyi, Xu Mingwei, Geng Nan, Zhang Xiang.
A Survey on Machine Learning Based Routing Algorithms
[J]. Journal of Computer Research and Development, 2020, 57(4): 671-687.
|
[12] |
Zhou Wen, Zhang Shikun, Ding Yong, Chen Xi.
Adversarial Example Attack Analysis of Low-Dimensional Industrial Control Network System Dataset
[J]. Journal of Computer Research and Development, 2020, 57(4): 736-745.
|
[13] |
Liu Junxu, Meng Xiaofeng.
Survey on Privacy-Preserving Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362.
|
[14] |
Cheng Guang, Qian Dexin, Guo Jianwei, Shi Haibin, Hua, Zhao Yuyu.
A Classification Approach Based on Divergence for Network Traffic in Presence of Concept Drift
[J]. Journal of Computer Research and Development, 2020, 57(12): 2673-2682.
|
[15] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|