[1] |
CHAI Xu, FANG Ming, FU Feiran, SHAO Zhen.
Sight Estimation Algorithms for Examinee in Examination Room Environment
[J]. Computer Engineering and Applications, 2021, 57(9): 199-206.
|
[2] |
XU Xiaochun, DONG Hongwei, WEI Chengfeng.
Application of Improved CAGAN in Virtual Try-on
[J]. Computer Engineering and Applications, 2021, 57(6): 152-158.
|
[3] |
WANG Haiyong, LI Haiyang, GAO Xuejiao.
Research on Image Restoration Method Based on Structure Embedding
[J]. Computer Engineering and Applications, 2021, 57(22): 241-246.
|
[4] |
WEI Danni, YANG Youlong, QIU Haiquan.
Self-Training Algorithm Combining Density Peak and Cut Edge Weight
[J]. Computer Engineering and Applications, 2021, 57(2): 70-76.
|
[5] |
LI Xiangxia, XIE Xian, LI Bin, YIN Hua, XU Bo, ZHENG Xinwei.
Application of Generative Adversarial Networks in Medical Image Processing
[J]. Computer Engineering and Applications, 2021, 57(18): 24-37.
|
[6] |
MENG Xiaojuan, ZHANG Yueqin, HAO Xiaoli, LYU Jinlai.
Multi-class Deep Convolutional Generative Adversarial Networks for Belt Tear Detection
[J]. Computer Engineering and Applications, 2021, 57(16): 269-275.
|
[7] |
ZHU Deli, XIONG Chang, HU Xuekui, LI Wei, WANG Qing.
Single Image De-raining Method Based on Attention Generation Adversarial Network
[J]. Computer Engineering and Applications, 2021, 57(15): 215-222.
|
[8] |
ZHANG Bowen, LIU Zhi, SANG Guoming.
Anomaly Detection Algorithm Based on Kernel Density Fluctuation
[J]. Computer Engineering and Applications, 2021, 57(12): 132-136.
|
[9] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[10] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[11] |
SUN Xiao, DING Xiaolong.
Data Augmentation Method Based on Generative Adversarial Networks for Facial Expression Recognition Sets
[J]. Computer Engineering and Applications, 2020, 56(4): 115-121.
|
[12] |
LI Cheng, ZHANG Yu, HUANG Chuhua.
Improved Super-Resolution Reconstruction of Image Based on Generative Adversarial Networks
[J]. Computer Engineering and Applications, 2020, 56(4): 191-196.
|
[13] |
HE Huanye, LIN Guoyuan, GU Hao, FANG Menghua.
Improved LOF Algorithm in Cloud Virtual Machine Anomaly Detection Scenario
[J]. Computer Engineering and Applications, 2020, 56(23): 80-86.
|
[14] |
ZHAN Peng, CHEN Lin, CAO Luhui, XU Haoran, LI Xueqing.
Time Series Anomaly Detection Based on Kernel Turning Points Clipped Representation
[J]. Computer Engineering and Applications, 2020, 56(23): 130-138.
|
[15] |
WU Xin, HUANG Bo, FANG Zhijun, LIU Wenzhu.
Application of Sequence Generative Adversarial Network in Recommendation System
[J]. Computer Engineering and Applications, 2020, 56(23): 175-179.
|