[1] |
WEI Hao, ZHOU Ai, ZHANG Yijia, CHEN Fei, QU Wen, LU Mingyu.
Review of Deep Learning-Based Biomedical Entity Relation Extraction Research
[J]. Computer Engineering and Applications, 2021, 57(21): 14-23.
|
[2] |
ZHANG Bohan, LING Jie.
Improved Malware Detection Method Based on DNN
[J]. Computer Engineering and Applications, 2021, 57(10): 81-87.
|
[3] |
HUO Lin, LU Yinli.
Improved Particle Swarm Optimization for Android Malware Detection
[J]. Computer Engineering and Applications, 2020, 56(7): 96-101.
|
[4] |
WU Cheng, WANG Chaokun, WANG Muxian.
Entity Attributes Extraction Based on Text Simplification
[J]. Computer Engineering and Applications, 2020, 56(21): 115-122.
|
[5] |
LIU Chenhui, ZHANG Desheng, HU Gang.
Research on Chinese Key Phrase Extraction Algorithm Based on TAKE
[J]. Computer Engineering and Applications, 2020, 56(10): 115-121.
|
[6] |
WANG Wenchong, LING Jie.
Android malware detection approach based on fuzzy Hash
[J]. Computer Engineering and Applications, 2018, 54(18): 133-138.
|
[7] |
LIU Chushu, WANG Weiping, LIU Pengfei.
Detection of Android malware using resource features
[J]. Computer Engineering and Applications, 2018, 54(15): 67-73.
|
[8] |
WANG Haiyong, FENG Zhaoxu, YANG Haibo, ZHANG Jindong.
Research on text extraction algorithm based on structure similarity page clustering
[J]. Computer Engineering and Applications, 2018, 54(11): 122-127.
|
[9] |
DU Boyuan1, WANG Meiqing1, CHEN Changfu2, CHEN Fei1.
Tags extraction for Web information based on structure consistency and feature learning
[J]. Computer Engineering and Applications, 2017, 53(7): 74-78.
|
[10] |
ZHAO Xiaoyong, WANG Lei.
Product specification auto extract method of e-commerce websites
[J]. Computer Engineering and Applications, 2017, 53(24): 168-171.
|
[11] |
LIN Qingyu, LING Jie.
Android malware detection based on application classfication and system calls
[J]. Computer Engineering and Applications, 2017, 53(19): 109-113.
|
[12] |
GU Nannan, FENG Jun, SUN Xia, ZHAO Yan, ZHANG Lei.
Chinese resume information automatic extraction and recommendation algorithm
[J]. Computer Engineering and Applications, 2017, 53(18): 141-148.
|
[13] |
YANG Guanzhong, LI Hongxuan.
Approach based on WSFT for crawling deep web
[J]. Computer Engineering and Applications, 2017, 53(18): 236-242.
|
[14] |
SUN Hongmin, JIANG Nannan, LI Xiang.
Research on biological information mining model based on document set
[J]. Computer Engineering and Applications, 2016, 52(24): 102-106.
|
[15] |
HAN Yonghua, LEI Yuxia, CHEN Juan, WANG Xiangde.
Multi-frame knowledge inconsistency detection and revision algorithms
[J]. Computer Engineering and Applications, 2016, 52(23): 94-97.
|