[1] |
WANG Chengxian1, ZHAO Qing2.
Yi Language Named Entity Recognition Method Based on CR-BACC Model
[J]. Computer and Modernization, 2025, 0(05): 28-35.
|
[2] |
CHI Biwei1, SUN Rui2.
DDoS Attack Detection Method Based on Transformer Architecture
[J]. Computer and Modernization, 2025, 0(05): 36-40.
|
[3] |
MA Jian, WANG Yifei, MENG Li, HE Yunfei, YANG Fei.
Label-independent Information Compression for Heterogeneous Graph Representation
[J]. Computer and Modernization, 2025, 0(04): 36-41.
|
[4] |
SUN Qining1, GUI Zhiming1, LIU Yanfang2, FAN Xinxin3, LU Yunfeng4.
Graph Neural Network-based Multi-agent Reinforcement Learning for Adversarial Policy Detection Algorithm
[J]. Computer and Modernization, 2025, 0(04): 42-49.
|
[5] |
LIU Wenxin1, XU Wenhui1, CHEN Zhaoye1, GU Haiying1, WEN Cong2, YAO Yulong2, ZENG Xi2.
Predictive Modeling of Ash Conveying in Thermal Power Plants Based on RFECV-XGBoost and SHAP
[J]. Computer and Modernization, 2025, 0(04): 63-69.
|
[6] |
WANG Jiale, SONG Wenai, FU Lizhen.
Occupational Pneumoconiosis Screening Based on HA-Net Model
[J]. Computer and Modernization, 2025, 0(04): 103-110.
|
[7] |
LI Xiaomeng1, 2, JIANG Rong1, LIANG Zhihong3, YU Yimin1.
Cross Border E-commerce Data Security Sharing Model Based on Zero Trust and Blockchain
[J]. Computer and Modernization, 2025, 0(04): 111-118.
|
[8] |
TANG Rui1, WU Jianchao1, CHEN Jianbo1, CHAI Jiang1, WANG Qian1, HE Yuchen2.
Improved YOLOv8s Algorithm Based on GiraffeDet for Transmission Line Icing Detection
[J]. Computer and Modernization, 2025, 0(03): 6-11.
|
[9] |
CAO Lu, DING Cangfeng, MA Lerong, YAN Zhaoyao, YOU Hao.
Multilevel Joint Graph Embedding for Lipophilic Molecular Classification
[J]. Computer and Modernization, 2025, 0(03): 12-21.
|
[10] |
ZHANG Taotao, XIE Jun, QIAO Pingjuan.
Specific Emitter Identification Method Based on Multi-source Unsupervised Domain Adaptation
[J]. Computer and Modernization, 2025, 0(03): 45-51.
|
[11] |
SHAO Yeqin1, WANG Haiquan2, ZHOU Kunyang3, GUO Yudi2, SHI Quan1.
One-stage Semi-supervised Object Detection by Reusing Unreliable Pseudo-labels
[J]. Computer and Modernization, 2025, 0(03): 52-59.
|
[12] |
BIAN Xinye1, XIE Dongmei1, WANG Ziling1, QU Zhijian1, YU Jiafeng2.
sORF-BERT: A Method on Identifying Coding sORFs Based on Pre-trained Models
[J]. Computer and Modernization, 2025, 0(03): 71-77.
|
[13] |
HUA Man1, LI Jingchang1, LI Yanling2.
PRNG Algorithm Based on Improved Piecewise Logistic Mapping
[J]. Computer and Modernization, 2025, 0(03): 113-118.
|
[14] |
WANG Le, WANG Zhiying.
An Empirical Study on the Drift Diffusion of Task Interruption in User Identification of Phishing
[J]. Computer and Modernization, 2025, 0(02): 1-12.
|
[15] |
FENG Xinjie, WANG Wei.
Twin Feature Fusion Network for Scene Text Image Super Resolution
[J]. Computer and Modernization, 2025, 0(02): 86-93.
|