| [1] |
ZHAO Yan, MA Hui-fang, WANG Wen-tao, TONG Hai-bin, HE Xiang-chun.
A reliable response representation enhanced knowledge tracing method
[J]. Computer Engineering & Science, 2024, 46(03): 535-544.
|
| [2] |
GUO Yi, HE Ting-nian, LI Ai-bin, MAO Jun-yu.
A knowledge tracing model fusing GA-CART and Deep-IRT
[J]. Computer Engineering & Science, 2023, 45(09): 1691-1700.
|
| [3] |
YIN Chun-yong, FENG Meng-xue.
A semi-supervised log anomaly detection method based on attention mechanism
[J]. Computer Engineering & Science, 2023, 45(08): 1405-1415.
|
| [4] |
LEI Xuan, CHENG Guang, ZHANG Yu-jian, GUO Liang, ZHANG Fu-cun.
Association analysis of alarm information based on power network situation awareness platform
[J]. Computer Engineering & Science, 2023, 45(07): 1197-1208.
|
| [5] |
WANG Chen-yu, WEN Hao-min, GUO Sheng-nan, LIN You-fang, WAN Huai-yu, .
Multi-task deep spatial-temporal networkfor couriers pick-up arrival time prediction
[J]. Computer Engineering & Science, 2023, 45(01): 136-144.
|
| [6] |
CHENG Xiao-gang, GUO Ren, ZHOU Chang-li, .
A distributed privacy-preserving data mining framework based on rational cryptography
[J]. Computer Engineering & Science, 2022, 44(10): 1781-1787.
|
| [7] |
WANG Wen-tao, MA Hui-fang, SHU Yue-yu, HE Xiang-chun.
Knowledge tracing based on contextualized representation
[J]. Computer Engineering & Science, 2022, 44(09): 1693-1701.
|
| [8] |
CUI Hong, ZHAO Shuang, ZHANG Guang-sheng, SU Jin-shu.
A mobile proxy application traffic identification method based on machine learning
[J]. Computer Engineering & Science, 2022, 44(04): 654-664.
|
| [9] |
JIA Jun-jie, DUAN Chao-qiang.
A shilling attack detection algorithm based on score dispersion
[J]. Computer Engineering & Science, 2022, 44(03): 554-562.
|
| [10] |
LIU Yun, XIAO Tian.
A conditional causality mining algorithm in network log data
[J]. Computer Engineering & Science, 2021, 43(09): 1584-1590.
|
| [11] |
WEN Kai, XU Meng-meng, ZHANG Xu-hong, .
A weighted erasable itemset mining algorithm based on list structure
[J]. Computer Engineering & Science, 2021, 43(09): 1676-1683.
|
| [12] |
WANG Li-qiao, ZHANG Da-min, FAN Ying, XU Hang, WANG Yi-rou.
Multilayer perceptron training based on a Cauchy variant grey wolf optimizer algorithm
[J]. Computer Engineering & Science, 2021, 43(06): 1131-1140.
|
| [13] |
XIONG Zhong-min, WANG Bo, TAO Ran, ZHENG Zong-sheng, CHEN Ming, .
An association rule mining reduction algorithm based on determining prime attributes
[J]. Computer Engineering & Science, 2021, 43(04): 738-745.
|
| [14] |
ZANG Run-qiang, ZUO Mei-yun, GUO Xin-xin.
Disease prediction of elderly patients based on Doc2Vec and BiLSTM
[J]. Computer Engineering & Science, 2020, 42(12): 2273-2279.
|
| [15] |
ZHANG Yuan, JIANG Huancheng.
Research on health management system of largecaliber artillery based on deep learning
[J]. Computer Engineering & Science, 2020, 42(11): 2050-2058.
|