Search Results - Editorial office of Computer Science

Refine Results
  1. 1

    Survey of Rigid Object Pose Estimation Algorithms Based on Deep Learning by Guo, Nan, Li, Jingyuan, Ren, Xi

    Published in Ji suan ji ke xue (01-02-2023)
    “…Rigid object pose estimation aims to obtain 3D translation and 3D rotation information of the rigid object in the camera coordinate system, which plays an…”
    Get full text
    Journal Article
  2. 2

    XGBoost for Imbalanced Data Based on Cost-sensitive Activation Function by Li, Jing-tai, Wang, Xiao-dan

    Published in Ji suan ji ke xue (01-05-2022)
    “…For binary classification with category imbalance, a cost-sensitive activation function XGBoost algorithm(CSAF-XGBoost) is proposed to promote the ability of…”
    Get full text
    Journal Article
  3. 3

    Physics-informed Neural Networks:Recent Advances and Prospects by Li, Ye, Chen, Song-can

    Published in Ji suan ji ke xue (01-04-2022)
    “…Based on Physical Information PINN (Physics-informed Neural Networks, PINN) is a class of neural networks used to solve supervised learning tasks. It not only…”
    Get full text
    Journal Article
  4. 4

    Dynamic Network Security Analysis Based on Bayesian Attack Graphs by Li, Jia-rui, Ling, Xiao-bo, Li, Chen-xi, Li, Zi-mu, Yang, Jia-hai, Zhang, Lei, Wu, Cheng-nan

    Published in Ji suan ji ke xue (01-03-2022)
    “…In order to overcome the difficulties that current attack graph model cannot reflect real-time network attack events, a method is proposed including a forward…”
    Get full text
    Journal Article
  5. 5

    Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain by Liu, Feng, Zhang, Jia-jao, Zhou, Jun-jie, Li, Mu, Kong, De-li, Yang, Jie, Qi, Jia-yin, Zhou, Ai-min

    Published in Ji suan ji ke xue (01-01-2022)
    “…Blockchain is one of the hottest technical topics in recent years, and its related research theories are constantly enriched. However, the key problems of low…”
    Get full text
    Journal Article
  6. 6

    Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS by Liu, Feng, Wang, Yi-Fan, Yang, Jie, Zhou, Ai-Min, Qi, Jia-Yin

    Published in Ji suan ji ke xue (01-11-2021)
    “…Threshold signature protocol is one of the basic tools of multi-party information security protocol, which has a wide range of uses in identity authentication,…”
    Get full text
    Journal Article
  7. 7

    Study on Degree of Node Based Personalized Propagation of Neural Predictions forSocial Networks by SHAO Yunfei, SONG You, WANG Baohui

    Published in Ji suan ji ke xue (01-04-2023)
    “…Graph is an important and fundamental data structure that presents in a wide variety of practical scenarios.With the rapid development of the Internet in…”
    Get full text
    Journal Article
  8. 8

    Review of Differential Privacy Research by ZHAO Yuqi, YANG Min

    Published in Ji suan ji ke xue (01-04-2023)
    “…In the past decade,widespread data collection has become the norm.With the rapid development of large-scale data analysis and machine learning,data privacy is…”
    Get full text
    Journal Article
  9. 9

    UAV Frequency-based Crowdsensing Using Grouping Multi-agentDeep Reinforcement Learning by Cui ZHANG, En WANG, Funing YANG, Yong jian YANG , Nan JIANG

    Published in Ji suan ji ke xue (01-02-2023)
    “…Mobile CrowdSensing (MCS) is a promising sensing paradigm that recruits users to cooperatively perform sensing tasks.Recently,unmanned aerial vehicles (UAVs)…”
    Get full text
    Journal Article
  10. 10

    Crack Detection of Concrete Pavement Based on Attention Mechanism and Lightweight DilatedConvolution by QU Zhong, WANG Caiyun

    Published in Ji suan ji ke xue (01-02-2023)
    “…Cracks in the concrete pavement will affect the safety,applicability,and durability of the structure,and crack detection is a challenging research hotspot.This…”
    Get full text
    Journal Article
  11. 11

    Chinese Nested Named Entity Recognition Algorithm Based on Segmentation Attention andBoundary-aware by ZHANG Rujia, DAI Lu, GUO Peng, WANG Bang

    Published in Ji suan ji ke xue (01-01-2023)
    “…Chinese nested named entity recognition(CNNER) is a challenging task due to the absence of natural delimiters in Chinese and the complexity of the nested…”
    Get full text
    Journal Article
  12. 12

    Novel Class Reasoning Model Towards Covered Area in Given Image Based on InformedKnowledge Graph Reasoning and Multi-agent Collaboration by RONG Huan, QIAN Minfeng, MA Tinghuai, SUN Shengjie

    Published in Ji suan ji ke xue (01-01-2023)
    “…Object detection is one of the most popular directions in computer vision,which is widely used in military,medical and other important fields.However,most…”
    Get full text
    Journal Article
  13. 13

    Text Material Recommendation Method Combining Label Classification and Semantic QueryExpansion by MENG Yiyue, PENG Rong, LYU Qibiao

    Published in Ji suan ji ke xue (01-01-2023)
    “…In the process of preparing various planning and research reports,researchers often need to collect and read a large amount of text materials according to the…”
    Get full text
    Journal Article
  14. 14

    Differential Privacy Based Fingerprinting Obfuscation Mechanism Towards NetworkReconnaissance Deception by HE Yuan, XING Chang-you, ZHANG Guo-min, SONG Li-hua, YU Hang

    Published in Ji suan ji ke xue (01-11-2022)
    “…Network fingerprinting detection is an important network reconnaissance method,which can be used by attackers to obtain the fingerprinting characteristics of…”
    Get full text
    Journal Article
  15. 15

    Prediction of Insulation Deterioration Degree of Cable Joints Based on Temperature and Operation Data by XU Si-qin, HUANG Xiang-qian, YANG Kun, ZHANG Zhan-long, GAN Peng-fei

    Published in Ji suan ji ke xue (01-10-2022)
    “…The deterioration of cable joints will lead to the increase of heat loss,and then lead to the rise of surface temperature of the joints.At the same time,the…”
    Get full text
    Journal Article
  16. 16

    Mutual Learning Knowledge Distillation Based on Multi-stage Multi-generative Adversarial Network by HUANG Zhong-hao, YANG Xing-yao, YU Jiong, GUO Liang, LI Xiang

    Published in Ji suan ji ke xue (01-10-2022)
    “…Aiming at the problems of insufficient knowledge distillation efficiency,single stage training methods,complex training processes and difficult convergence of…”
    Get full text
    Journal Article
  17. 17

    Parallel Optimization of Computational Fluid Dynamics Application Palabos Based on NextGeneration Sunway Supercomputer by LIU An-jun, YIN Hong-hui, WANG Li, LIU Zhi-xiang, KONG Bo, GUO Meng, CHEN Cheng-min, YANG Mei-hong

    Published in Ji suan ji ke xue (01-10-2022)
    “…Parallel lattice Boltzmann(Palabos)software is a widely used computational fluid dynamics software based on lattice Boltzmann method(LBM),which is widely used…”
    Get full text
    Journal Article
  18. 18

    Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion by ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong

    Published in Ji suan ji ke xue (01-09-2022)
    “…Enabling computers to understand the expressions of signers has been a challenging task that requires considering not only the temporal and spatial information…”
    Get full text
    Journal Article
  19. 19

    Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level by SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei

    Published in Ji suan ji ke xue (01-09-2022)
    “…Knowledge representation of scientific paper data is a problem to be solved,and how to learn the representation of paper nodes in scientific paper…”
    Get full text
    Journal Article
  20. 20

    Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment by CHEN Jing, WU Ling-ling

    Published in Ji suan ji ke xue (01-08-2022)
    “…Current feature detection methods for big data of Internet of vehicles ignore the data attribute weight,resulting in low efficiency and fail to provide…”
    Get full text
    Journal Article