[1] |
Wu Zhijun, Zhang Rudan, Yue Meng.
A Method for Joint Detection of Attacks in Named Data Networking
[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582.
|
[2] |
Zhang Yunjie, Zhang Xuan, Wang Xu, Ren Junmin, Tang Ziqi.
A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution
[J]. Journal of Computer Research and Development, 2021, 58(1): 208-223.
|
[3] |
Meng Yinfeng, Liang Jiye.
Linear Regularized Functional Logistic Model
[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626.
|
[4] |
Zhang Xiaoyang, Xu Jiahao, Hu Yuchong.
Proactive Locally Repairable Codes for Cloud Storage Systems
[J]. Journal of Computer Research and Development, 2019, 56(9): 1988-2000.
|
[5] |
Liu Xuehua, Ding Liping, Liu Wenmao, Zheng Tao, Li Yanfeng, Wu Jingzheng.
A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis
[J]. Journal of Computer Research and Development, 2019, 56(10): 2262-2276.
|
[6] |
Liang Dachuan, Li Jing, Liu Sai,Li Dongmin.
Multiple Object Saliency Detection Based on Graph and Sparse Principal Component Analysis
[J]. Journal of Computer Research and Development, 2018, 55(5): 1078-1089.
|
[7] |
Li Ran, Lin Zheng, Lin Hailun, Wang Weiping, Meng Dan.
Text Emotion Analysis: A Survey
[J]. Journal of Computer Research and Development, 2018, 55(1): 30-52.
|
[8] |
Yang Niya, Peng Tao, Liu Lu.
Link Prediction Method Based on Clustering and Decision Tree
[J]. Journal of Computer Research and Development, 2017, 54(8): 1795-1803.
|
[9] |
Xu Hang, Wang Wenjian, Ren Lifang.
A Method for Monotonic Classification Based on Decision Forest
[J]. Journal of Computer Research and Development, 2017, 54(7): 1477-1487.
|
[10] |
Yi Peng, Zhou Qiao, Men Haosong.
Dynamic Social Network Community Detection Algorithm Based on Hidden Markov Model
[J]. Journal of Computer Research and Development, 2017, 54(11): 2611-2619.
|
[11] |
Wen Kun,Yang Jiahai,Cheng Fengjuan,Yin Hui, Wang Jianfeng.
MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network
[J]. Journal of Computer Research and Development, 2015, 52(4): 813-822.
|
[12] |
Wu Lei,Zhang Wensheng,Wang Jue.
Hidden Topic Variable Graphical Model Based on Deep Learning Framework
[J]. Journal of Computer Research and Development, 2015, 52(1): 191-199.
|
[13] |
Hua Xiaopeng, and Ding Shifei,.
Locality Preserving Twin Support Vector Machines
[J]. Journal of Computer Research and Development, 2014, 51(3): 590-597.
|
[14] |
Wang Yiding, Jiang Nan, Li Kefeng.
Dynamic Spatial Synthesis of Dorsal Hand Vein Images Based on PCA
[J]. Journal of Computer Research and Development, 2014, 51(10): 2302-2307.
|
[15] |
Jiang Changhao, Zhang Min, Gao Bin, Liu Yiqun, and Ma Shaoping,.
Advertiser Status Modeling in Sponsored Search
[J]. , 2013, 50(12): 2621-2628.
|