[1] |
CHEN Deguang, MA Jinlin, MA Ziping, ZHOU Jie.
Review of Pre-training Techniques for Natural Language Processing
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(8): 1359-1389.
|
[2] |
REN Jianhua, LI Jing, MENG Xiangfu.
Document Classification Method Based on Context Awareness and Hierarchical Attention Network
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 305-314.
|
[3] |
YAN Chunman, WANG Cheng.
Development and Application of Convolutional Neural Network Model
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(1): 27-46.
|
[4] |
ZHAO Zongqu, FAN Tao, PENG Tingting, YE Qing, QIN Panke.
Key Encapsulation Mechanism from Lattice in Standard Model
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(4): 629-638.
|
[5] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[6] |
WANG Ping, ZHOU Zhiping, LI Jing.
Improved Server-less RFID Security Authentication Protocol
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1117-1125.
|
[7] |
WANG Sheng, XIE Hui, ZHANG Fuquan.
Semi-Fragile Image Watermarking Algorithm by Using Edge Detection and Zernike Invariant Moments
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(4): 629-641.
|
[8] |
ZHANG Fuqiang, CHEN Lin, WU Dongdong.
国防科学技术大学 计算机学院,长沙 410073
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(3): 382-388.
|
[9] |
FENG He, CHANG Guoquan, GUO Xiaobo.
Hash Algorithm for Color Image Based on Super-Complex Fourier Transform Coupled with Position Permutation
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(11): 1837-1848.
|
[10] |
LIU Peiyu, HOU Xiuyan, ZHU Zhenfang, LIU Fang, CAI Xiaohong.
Micro-Blog Hot Topic Detection Based on Heat Co-ranking
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 573-581.
|
[11] |
XIAO Meihua, LIU Xinqian, LI Yanan, CHENG Daolei, MEI Yingtian.
Security Certification of Three-Party Network Protocols Based on Strong Authentication Theory
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(12): 1701-1710.
|
[12] |
LIU Chao, XU Yabin, WU Zhuang.
Method for Rapid Detecting Micro-Blog Communities
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(9): 1100-1107.
|
[13] |
XU Yunpeng, HUANG Zunguo, XU Jinsong.
Research and Analysis on Efficient Authentication Protocols for Heterogeneous Integrated Network
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(3): 330-337.
|
[14] |
XIE Qingqing, WANG Liangmin.
Data Stream Range Query Authentication Scheme Based on PMD in Outsourced Database
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(10): 1209-1218.
|
[15] |
ZHAN Yong, YANG Yan, WANG Hongjun.
Extracting Overlapping Topics from Micro-Blog Based on Mixture Model
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(8): 747-753.
|