[1] |
Li Xin, Li Zhemin, Wei Juhui, Yang Yating, Wang Hongxia.
Cross-Domain Adaptive Learning Model Based on Feature Separation
[J]. Journal of Computer Research and Development, 2022, 59(1): 105-117.
|
[2] |
Zhou Peng, Wu Yanjun, Zhao Chen.
Identify Linux Security Vulnerability Fix Patches Automatically
[J]. Journal of Computer Research and Development, 2022, 59(1): 197-208.
|
[3] |
Pan Shijie, Gao Fei, Wan Linchun, Qin Sujuan, Wen Qiaoyan.
Quantum Algorithm for Spectral Regression
[J]. Journal of Computer Research and Development, 2021, 58(9): 1835-1842.
|
[4] |
Ma Yang, Liu Zeyi, Liang Xingxing, Cheng Guangquan, Yang Fangjie, Cheng Qing, Liu Zhong.
Gene Sequence Representation Learning Based on Virus Transmission Network
[J]. Journal of Computer Research and Development, 2021, 58(8): 1642-1654.
|
[5] |
Xiao Tianming, Guan Jianbo, Jian Songlei, Ren Yi, Zhang Jianfeng, Li Bao.
Software Vulnerability Detection Method Based on Code Property Graph and Bi-GRU
[J]. Journal of Computer Research and Development, 2021, 58(8): 1668-1685.
|
[6] |
Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi.
Webpage Fingerprinting Identification on Tor: A Survey
[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788.
|
[7] |
Shao Tianzhu, Wang Xiaoliang, Chen Wenlong, Tang Xiaolan, Xu Min.
Design of an Intelligent Routing Algorithm to Reduce Routing Flap
[J]. Journal of Computer Research and Development, 2021, 58(6): 1261-1274.
|
[8] |
Sun Cong, Li Zhankui, Chen Liang, Ma Jianfeng, Qiao Xinbo.
Digital Currency Features Oriented Fine-Grained Code Injection Attack Detection
[J]. Journal of Computer Research and Development, 2021, 58(5): 1035-1044.
|
[9] |
Wang Jialai, Zhang Chao, Qi Xuyan, Rong Yi.
A Survey of Intelligent Malware Detection on Windows Platform
[J]. Journal of Computer Research and Development, 2021, 58(5): 977-994.
|
[10] |
Wang Ye, Chen Junwu, Xia Xin, Jiang Bo.
Intelligent Requirements Elicitation and Modeling: A Literature Review
[J]. Journal of Computer Research and Development, 2021, 58(4): 683-705.
|
[11] |
Wu Zongyou, Bai Kunlong, Yang Linrui, Wang Yiqi, Tian Yingjie.
Review on Text Mining of Electronic Medical Record
[J]. Journal of Computer Research and Development, 2021, 58(3): 513-527.
|
[12] |
Chen Jinyin, Chen Yipeng, Chen Yiming, Zheng Haibin, Ji Shouling, Shi Jie, Cheng Yao.
Fairness Research on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(2): 264-280.
|
[13] |
Zhang Bing, Wen Zheng, Wei Xiaoyu, Ren Jiadong.
InterDroid: An Interpretable Android Malware Detection Method for Conceptual Drift
[J]. Journal of Computer Research and Development, 2021, 58(11): 2456-2474.
|
[14] |
Gu Mianxue, Sun Hongyu, Han Dan, Yang Su, Cao Wanying, Guo Zhen, Cao Chunjie, Wang Wenjie, Zhang Yuqing.
Software Security Vulnerability Mining Based on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(10): 2140-2162.
|
[15] |
Guo Juanjuan, Wang Qiongxiao, Xu Xin, Wang Tianyu, Lin Jingqiang.
Secure Multiparty Computation and Application in Machine Learning
[J]. Journal of Computer Research and Development, 2021, 58(10): 2163-2186.
|