[1] |
DU Yao.
Android Malicious Family Detection Algorithm Based on Local Optimization Matching
[J]. Computer Engineering and Applications, 2021, 57(8): 84-90.
|
[2] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[3] |
ZHANG Shuiping, WANG Lina.
Research and Analysis on Progress of Fruit Fly Optimization Algorithm
[J]. Computer Engineering and Applications, 2021, 57(6): 22-29.
|
[4] |
LIU Chang, QIU Weigen, ZHANG Lichen.
Person Re-identification Based on Deformable Mask Alignment Convolution Model
[J]. Computer Engineering and Applications, 2021, 57(5): 146-152.
|
[5] |
YANG Yanan, ZHANG Hongming, LI Hanghao, YANG Jiangtao, QUAN Kai.
Research on UAV Terrace Recognition Method Based on FCN and DenseCRF Model
[J]. Computer Engineering and Applications, 2021, 57(3): 222-230.
|
[6] |
XIE Yinggang, WANG Quan.
Summary of Dynamic Gesture Recognition Based on Vision
[J]. Computer Engineering and Applications, 2021, 57(22): 68-77.
|
[7] |
XIAO Yani, FAN Xinyue, CHEN Wenfeng.
Research on Person Re-identification Based on Integrating Local Features Under Multi-branches
[J]. Computer Engineering and Applications, 2021, 57(18): 213-219.
|
[8] |
DU Zhuoqun, HU Xiaoguang, YANG Shixin, LI Xiaoxiao, WANG Ziqiang, CAI Nengbin.
Overview of Pedestrian Re-identification Research Based on Multi-source Information
[J]. Computer Engineering and Applications, 2021, 57(14): 1-14.
|
[9] |
WANG Tengfei, CAI Manchun, YUE Ting, LU Tianliang.
Tor Anonymous Traffic Identification Based on Histogram-XGBoost
[J]. Computer Engineering and Applications, 2021, 57(14): 110-115.
|
[10] |
WANG Yifan, LU Huimin, GAO Ruoran, LI Yang.
Review:Region of Interest Extraction from Finger Vein Images
[J]. Computer Engineering and Applications, 2021, 57(13): 34-42.
|
[11] |
MI Yuan, TANG Hengliang.
Rumor Identification Research Based on Graph Convolutional Network
[J]. Computer Engineering and Applications, 2021, 57(13): 161-167.
|
[12] |
HU Yuelin, CAI Xiaodong, LIU Yuzhu.
Cross-Domain Person Re-identification Algorithm Combining Inter-Domain and Intra-Domain Changes
[J]. Computer Engineering and Applications, 2021, 57(13): 212-217.
|
[13] |
XIE Xiang, ZHANG Qianru, ZHANG Jing, GAO Xinyu.
Research and Application on Information System Component Identification Method Based on Domain Modeling-Oriented
[J]. Computer Engineering and Applications, 2021, 57(12): 105-114.
|
[14] |
CHEN Kunfeng, PAN Zhisong, WANG Jiabao, SHI Lei, ZHANG Jin, JIAO Shanshan.
Collaborative Learning Method for Cross Modality Person Re-identification
[J]. Computer Engineering and Applications, 2021, 57(12): 115-125.
|
[15] |
LI Bo.
Improved Deep Transfer Learning Algorithm for Person Re-identification
[J]. Computer Engineering and Applications, 2021, 57(10): 110-116.
|