[1] |
Wang Meng, Wang Haofen, Li Bohan, Zhao Xiang, Wang Xin.
Survey on Key Technologies of New Generation Knowledge Graph
[J]. Journal of Computer Research and Development, 2022, 59(9): 1947-1965.
|
[2] |
Ning Yuanlong, Zhou Gang, Lu Jicang, Yang Dawei, Zhang Tian.
A Representation Learning Method of Knowledge Graph Integrating Relation Path and Entity Description Information
[J]. Journal of Computer Research and Development, 2022, 59(9): 1966-1979.
|
[3] |
Guo Zhengshan, Zuo Jie, Duan Lei, Li Renhao, He Chengxin, Xiao Yingjie, Wang Peiyan.
A Generative Adversarial Negative Sampling Method for Knowledge Hypergraph Link Prediction
[J]. Journal of Computer Research and Development, 2022, 59(8): 1742-1756.
|
[4] |
Li Yuan, Chen Zhaojiong, Ye Dongyi.
A Coloring Algorithm for Flower Line Drawings with Meticulous Effect Based on Semantic Matching of Reference Images
[J]. Journal of Computer Research and Development, 2022, 59(6): 1271-1285.
|
[5] |
Fu Tao, Chen Zhaojiong, Ye Dongyi.
GAN-Based Bidirectional Decoding Feature Fusion Extrapolation Algorithm of Chinese Landscape Painting
[J]. Journal of Computer Research and Development, 2022, 59(12): 2816-2830.
|
[6] |
Hu Xuyang, Wang Zhizheng, Sun Yuanyuan, Xu Bo, Lin Hongfei.
Knowledge Graph Representation Method Combined with Semantic Parsing
[J]. Journal of Computer Research and Development, 2022, 59(12): 2878-2888.
|
[7] |
Liu Guangrui, Zhang Weizhe, Li Xinjie.
Data Contamination Defense Method for Intelligent Network Intrusion Detection Systems Based on Edge Examples
[J]. Journal of Computer Research and Development, 2022, 59(10): 2348-2361.
|
[8] |
Dai Hong, Sheng Lijie, Miao Qiguang.
Adversarial Discriminative Domain Adaptation Algorithm with CapsNet
[J]. Journal of Computer Research and Development, 2021, 58(9): 1997-2012.
|
[9] |
Chu Xiaokai, Fan Xinxin, Bi Jingping.
Position-Aware Network Representation Learning via K-Step Mutual Information Estimation
[J]. Journal of Computer Research and Development, 2021, 58(8): 1612-1623.
|
[10] |
Chen Bofeng, Li Jingdong, Lu Xingjian, Sha Chaofeng, Wang Xiaoling, Zhang Ji.
Survey of Deep Learning Based Graph Anomaly Detection Methods
[J]. Journal of Computer Research and Development, 2021, 58(7): 1436-1455.
|
[11] |
Qian Yaguan, He Niannian, Guo Yankai, Wang Bin, Li Hui, Gu Zhaoquan, Zhang Xuhong, Wu Chunming.
An Evasion Algorithm to Fool Fingerprint Detector for Deep Neural Networks
[J]. Journal of Computer Research and Development, 2021, 58(5): 1106-1117.
|
[12] |
Chen Jinyin, Huang Guohan, Zhang Dunjie, Zhang Xuhong, Ji Shouling.
GRD-GNN: Graph Reconstruction Defense for Graph Neural Network
[J]. Journal of Computer Research and Development, 2021, 58(5): 1075-1091.
|
[13] |
Fu Zhangjie, Li Enlu, Cheng Xu, Huang Yongfeng, Hu Yuting.
Recent Advances in Image Steganography Based on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(3): 548-568.
|
[14] |
Chen Dawei, Fu Anmin, Zhou Chunyi, Chen Zhenzhu.
Federated Learning Backdoor Attack Scheme Based on Generative Adversarial Network
[J]. Journal of Computer Research and Development, 2021, 58(11): 2364-2373.
|
[15] |
Song Yubo, Chen Bing, Zheng Tianyu, Chen Hongyuan, Chen Liquan, Hu Aiqun.
Hybrid Feature Fingerprint-Based Wireless Device Identification
[J]. Journal of Computer Research and Development, 2021, 58(11): 2374-2399.
|