[1] |
CHANG Xiao, HUANG Zhibin, YU Min, YANG Wubing.
A Deep Decision Tree Model for Aerospace Big Data
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 1-6.
|
[2] |
OUYANG Mowei, KANG Guixia, WANG Kailiang, WANG Yaming.
Automated Hippocampal Sclerosis Detection Method with Radiomics Analysis
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 51-57.
|
[3] |
MU Xiao-hui, LI Li-xiang.
Network Traffic Prediction of Dropout Echo State Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 10-13,20.
|
[4] |
TANG Yong-li, LI Xing-yu, ZHAO Zong-qu, LI Yun-feng.
Detection Method for Android Payment Cracked Application
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 95-101.
|
[5] |
PENG Yu-he, CHEN Xiang, CHEN Shuang-wu, YANG Jian.
Cross-Domain Abnormal Traffic Detection Based on Transfer Learning
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 33-39.
|
[6] |
Lü Xing-feng, LI Jin-bao.
A Method of Detecting Sleep Apnea Using Random Forest
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 64-70.
|
[7] |
ZHANG De-gan, CHEN Lu, CHEN Chen, ZHANG Ting, CUI Yu-ya.
A New Algorithm of QoS Constrained Routing for Node Energy Optimization of Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 101-105.
|
[8] |
ZHOU Yi-lin, YANG Lu, LU Wen-rui.
Exploring the Life Modeling Methods for Electrochemical Migration Failure of Printed Circuit Board under Dust Particles
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(3): 11-18,31.
|
[9] |
ZHANG Guo-dong, YING Huan, YANG Shou-guo, SHI Zhi-qiang, LI Ji-yuan.
Automatic Identification and Cracking Method for Vulnerable Hash Functions of Embedded Firmwares
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 46-53.
|
[10] |
MENG Hao, HUO Ru, GUO Qian-ying, HUANG Tao, LIU Yun-jie.
Machine Learning-Based Stochastic Task Offloading Algorithm in Mobile-Edge Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 25-30.
|
[11] |
CUI Hong-yan, XU Shuai, ZHANG Li-feng, Roy E. Welsch, Berthold K. P. Horn.
The Key Techniques and Future Vision of Feature Selection in Machine Learning
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 1-12.
|
[12] |
DONG Feng, LIU Tian-ming, XU Guo-ai, GUO Yan-hui, LI Cheng-ze.
Defect Prediction Method for Android Binary Files
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 13-23.
|
[13] |
DONG Yuan1,ZHOU Tao1,DONG Cheng-yu2,WANG Hai-la2.
Prosodic Structure Prediction based on Conditional Random Field Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(5): 36-40.
|
[14] |
Guochu Shou Yihong Hu.
Network Flow Identification Based on Machine Learning
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(1): 65-68.
|
[15] |
QI Zhi-li, BAI Zhong-ying.
An Algorithm of Learning from Example
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2000, 23(1): 26-30.
|