[1] |
LYU Haoyuan, YU Lu, ZHOU Xingyu, DENG Xiang.
Review of Semi-supervised Deep Learning Image Classification Methods
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(6): 1038-1048.
|
[2] |
WANG Runzheng, GAO Jian, TONG Xin, YANG Mengqi.
Research on Malicious Code Family Classification Combining Attention Mechanism
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(5): 881-892.
|
[3] |
ZHANG Jing, HUANG Haomiao.
Multi-convolutional Layer Feature Response Tracking Algorithm Combined with Re-detection Mechanism
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 533-544.
|
[4] |
QU Jingjing, CAI Ying, FAN Yanfang, XIA Hongke.
Differentially Private Mixed Data Release Algorithm Based on k-prototype Clustering
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(1): 109-118.
|
[5] |
CHENG Fengwei, WANG Wenjian.
Granular Support Vector Machine Algorithm Based on Affinity Propagation
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(7): 1194-1199.
|
[6] |
ZHOU Guangyue, LI Kewen, LIU Wenying, SU Zhaoxin.
Grey Wolf Optimizes Mixed Parameter Multi-Classification Twin Support Vector Machine
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(4): 628-636.
|
[7] |
ZHANG Mohua, PENG Jianhua.
Hierarchical Bayesian Local Gaussian Mixture Model for Image Restoration
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(2): 325-335.
|
[8] |
DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi.
Method of Privacy Preserving in Dynamic Social Network Data Publication
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458.
|
[9] |
LI Cong, GE Hongwei.
Robust Speech Feature Extraction Based on Nonlinear Power-Function Gammachirp Filter
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1351-1359.
|
[10] |
ZHANG Xiaolin, HE Xiaoyu, ZHANG Huanxiang, LI Zhuolin.
PLRD-(k,m):Distributed k-Degree-m-Label Anonymity with Protecting Link Rela-tionships
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 70-82.
|
[11] |
LI Wen, HUANG Lishao, LUO Entao.
Anonymous Privacy Protection Model with Individual l-Diversity in Mobile Health
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 761-768.
|
[12] |
YANG Zhangjing, ZHANG Fanlong, ZHANG Hui, YANG Guowei, LI Zuoyong, LUO Limin.
Tri-Decomposition Model and Algorithm with Application in Image Recovery
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(12): 1940-1949.
|
[13] |
JIN Xiaomin, ZHANG Liping.
Hashing Authentication Algorithm of Image Based on Angle of Hybrid?Features and Color Vector
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(10): 1671-1683.
|
[14] |
LI Zhoujun, ZHANG Jiangxiao, FENG Chunhui, SUI Chunrong.
Survey on E-Cash Scheme
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(11): 1701-1712.
|
[15] |
CAO Lixia, HUANG Guangqiu.
Rough Game Model and Algorithm Design Based on Particle Swarm Optimization
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 565-572.
|