Citation: | Ji Rongrong, Lin Shaohui, Chao Fei, Wu Yongjian, Huang Feiyue. Deep Neural Network Compression and Acceleration: A Review[J]. Journal of Computer Research and Development, 2018, 55(9): 1871-1888. DOI: 10.7544/issn1000-1239.2018.20180129 |
[1] | Qi Lei, Ren Zihao, Liu Junxi, Geng Xin. Person Re-identification Method Based on Hybrid Real-Synthetic Data[J]. Journal of Computer Research and Development, 2025, 62(2): 418-431. DOI: 10.7544/issn1000-1239.202330718 |
[2] | Huang Yiwang, Huang Yuxin, Liu Sheng. A Lightweight Noise Label Learning Method Based on Online Distillation[J]. Journal of Computer Research and Development, 2024, 61(12): 3121-3133. DOI: 10.7544/issn1000-1239.202330382 |
[3] | Liu Weixin, Guan Yewei, Huo Jiarong, Ding Yuanchao, Guo Hua, Li Bo. A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2024, 61(5): 1218-1229. DOI: 10.7544/issn1000-1239.202330966 |
[4] | Yu Ying, Wei Wei, Tang Hong, Qian Jin. Multi-Stage Training with Multi-Level Knowledge Self-Distillation for Fine-Grained Image Recognition[J]. Journal of Computer Research and Development, 2023, 60(8): 1834-1845. DOI: 10.7544/issn1000-1239.202330262 |
[5] | Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024 |
[6] | Wei Xiushen, Xu Shulin, An Peng, Yang Jian. Multi-Instance Learning with Incremental Classes[J]. Journal of Computer Research and Development, 2022, 59(8): 1723-1731. DOI: 10.7544/issn1000-1239.20220071 |
[7] | Li Xiaocan, Xie Kun, Zhang Dafang, Xie Gaogang. Survey of Network Anomaly Detection Based on Low-Rank Decomposition[J]. Journal of Computer Research and Development, 2022, 59(7): 1589-1609. DOI: 10.7544/issn1000-1239.20210503 |
[8] | Wang Peiyan, Duan Lei, Guo Zhengshan, Jiang Weipeng, Zhang Yidan. Knowledge Hypergraph Link Prediction Model Based on Tensor Decomposition[J]. Journal of Computer Research and Development, 2021, 58(8): 1599-1611. DOI: 10.7544/issn1000-1239.2021.20210315 |
[9] | Zhang Pan, Lian Qiusheng. Low-Rank Relaxed Collaborative Representation Combined with Global and Local Features for Face Recognition[J]. Journal of Computer Research and Development, 2014, 51(12): 2663-2670. DOI: 10.7544/issn1000-1239.2014.20131200 |
[10] | Wu Xiangjun, Bian Rui, Ling Yingbiao, Jiang Yunfei. Research on Decomposition Strategy for Knowledge Tree of Characteristic Predicate[J]. Journal of Computer Research and Development, 2011, 48(2): 186-194. |
1. |
林炼升,郑焕钦,苏申,雷凯,陈晓丰,田志宏. 一种DeFi价格操纵攻击在线防御机制. 计算机研究与发展. 2025(02): 443-457 .
![]() | |
2. |
郭春霞. 基于权限验证图的Web访问控制漏洞检测方法. 自动化与仪器仪表. 2024(06): 252-256+260 .
![]() | |
3. |
安洋,李坤,李军怀,王怀军,臧东玲. 基于智能合约和企业信用的访问控制模型. 计算机系统应用. 2022(03): 197-202 .
![]() | |
4. |
孙彬文,陈竟飞,柳絮. 基于UML的智能合约生命周期动态模型. 工业技术创新. 2021(04): 79-88+108 .
![]() |