[1] |
Zhou Junkai, Wang Nian, Cui Li.
EasiLTOM: Signal Activity Interval Recognition Based on Local Dynamic Threshold
[J]. Journal of Computer Research and Development, 2022, 59(4): 826-833.
|
[2] |
Shen Zhengchen, Zhang Qianli, Zhang Chaofan, Tang Xiangyu, Wang Jilong.
Location Privacy Attack Based on Deep Learning
[J]. Journal of Computer Research and Development, 2022, 59(2): 390-402.
|
[3] |
Weng Zejia, Chen Jingjing, Jiang Yugang.
On the Generalization of Face Forgery Detection with Domain Adversarial Learning
[J]. Journal of Computer Research and Development, 2021, 58(7): 1476-1489.
|
[4] |
Jia Yingxia, Lang Congyan, Feng Songhe.
A Semantic Segmentation Method of Traffic Scene Based on Categories-Aware Domain Adaptation
[J]. Journal of Computer Research and Development, 2020, 57(4): 876-887.
|
[5] |
Zhuo Junbao, Su Chi, Wang Shuhui, Huang Qingming.
Min-Entropy Transfer Adversarial Hashing
[J]. Journal of Computer Research and Development, 2020, 57(4): 888-896.
|
[6] |
Liu Jinshuo, Feng Kuo, Jeff Z. Pan, Deng Juan, Wang Lina.
MSRD: Multi-Modal Web Rumor Detection Method
[J]. Journal of Computer Research and Development, 2020, 57(11): 2328-2336.
|
[7] |
Zhao Hongke, Wu Likang, Li Zhi, Zhang Xi, Liu Qi, Chen Enhong.
Predicting the Dynamics in Internet Finance Based on Deep Neural Network Structure
[J]. Journal of Computer Research and Development, 2019, 56(8): 1621-1631.
|
[8] |
Liu Jiexi, Chen Songcan.
Non-Stationary Multivariate Time Series Prediction with MIX Gated Unit
[J]. Journal of Computer Research and Development, 2019, 56(8): 1642-1651.
|
[9] |
Gao Tengfei, Liu Yongyan, Tang Yunbo, Zhang Lei, Chen Dan.
A Massively Parallel Bayesian Approach to Factorization-Based Analysis of Big Time Series Data
[J]. Journal of Computer Research and Development, 2019, 56(7): 1567-1577.
|
[10] |
Dian Yujie, Jin Qin.
Audio-Visual Correlated Multimodal Concept Detection
[J]. Journal of Computer Research and Development, 2019, 56(5): 1071-1081.
|
[11] |
Zhang Zhenguo, Wang Chao, Wen Yanlong, Yuan Xiaojie.
Time Series Shapelets Extraction via Similarity Join
[J]. Journal of Computer Research and Development, 2019, 56(3): 594-610.
|
[12] |
Liu Huan, Zheng Qinghua, Luo Minnan, Zhao Hongke, Xiao Yang, Lü Yanzhang.
Cross-Domain Adversarial Learning for Zero-Shot Classification
[J]. Journal of Computer Research and Development, 2019, 56(12): 2521-2535.
|
[13] |
Zhuang Liansheng, Lü Yang, Yang Jian, Li Houqiang.
Long Term Recurrent Neural Network with State-Frequency Memory
[J]. Journal of Computer Research and Development, 2019, 56(12): 2641-2648.
|
[14] |
Chao Lu, Peng Xiaohui,Xu Zhiwei.
Variant Entropy Profile: A Multi-Granular Information Model for Data on Things with Order-of-Magnitude Compression Ratios
[J]. Journal of Computer Research and Development, 2018, 55(8): 1653-1666.
|
[15] |
Zhang Qi, Hu Yupeng, Ji Cun, Zhan Peng, Li Xueqing.
Edge Computing Application: Real-Time Anomaly Detection Algorithm for Sensing Data
[J]. Journal of Computer Research and Development, 2018, 55(3): 524-536.
|