[1] |
LU Peng, CHEN Jinyu, ZOU Guoliang, WAN Ying, ZHENG Zongsheng, WANG Zhenhua.
Personalized Handwritten Chinese Character Generation Method for Unsupervised Image Translation
[J]. Computer Engineering and Applications, 2022, 58(8): 221-229.
|
[2] |
SHEN Xulin, LI Chaobo, LI Hongjun.
Overview on Video Abnormal Behavior Detection of GAN via Human Density
[J]. Computer Engineering and Applications, 2022, 58(7): 21-30.
|
[3] |
WANG Jing, WANG Kai, YAN Yingjian.
Research on Side Channel Attack Technology Based on Conditional Generation Against Network
[J]. Computer Engineering and Applications, 2022, 58(6): 110-117.
|
[4] |
WEI Chengfeng, DONG Hongwei, XU Xiaochun.
Attribute Editable Person Image Synthesis Based on Spatial Transformation
[J]. Computer Engineering and Applications, 2022, 58(6): 219-226.
|
[5] |
LI Peiyang, LI Xuan, CHEN Junjie, CHEN Yongle.
Adversarial Sample Generation for Evading Botnet Traffic Detection
[J]. Computer Engineering and Applications, 2022, 58(4): 126-133.
|
[6] |
JU Sibo, XU Jing, LI Yanfang.
Text-to-Single Image Method Based on Self-Attention
[J]. Computer Engineering and Applications, 2022, 58(3): 249-258.
|
[7] |
MI Aizhong, ZHANG Wei, QIAO Yingxu, XU Chengjing, HUO Zhanqiang.
Review of Research on Facial Makeup Transfer
[J]. Computer Engineering and Applications, 2022, 58(2): 15-26.
|
[8] |
WU Chenwen, LIANG Yuxin, TIAN Hongyan.
Research on COVID-19 CT Image Classification Method Based on Improved Convolutional Neural Network
[J]. Computer Engineering and Applications, 2022, 58(2): 225-234.
|
[9] |
TAO Qisheng, PENG Cheng, MAN Junfeng, LIU Yi.
Two-Step Transfer Learning Method for Bearing Fault Diagnosis
[J]. Computer Engineering and Applications, 2022, 58(2): 303-312.
|
[10] |
ZHANG Xin, ZHU Jiang.
Network Security Situation Elements Acquisition for Sample Imbalance
[J]. Computer Engineering and Applications, 2022, 58(1): 134-142.
|
[11] |
CHAI Xu, FANG Ming, FU Feiran, SHAO Zhen.
Sight Estimation Algorithms for Examinee in Examination Room Environment
[J]. Computer Engineering and Applications, 2021, 57(9): 199-206.
|
[12] |
WU Wenlong, ZHOU Xi, WANG Yi, WANG Baoquan.
WKAG:Fraud Detection Method for Imbalanced Medical Insurance Data
[J]. Computer Engineering and Applications, 2021, 57(9): 247-254.
|
[13] |
WANG Jinyu, YANG Haitao, LI Gaoyuan, ZHANG Changgong, FENG Bodi.
Research Progress of Generative Adversarial Network and Its Application in Image Processing
[J]. Computer Engineering and Applications, 2021, 57(8): 26-35.
|
[14] |
LI Jian, SUN Dasong, ZHANG Beiwei.
Image Restoration Using Dual-Encoder and Adversarial Training
[J]. Computer Engineering and Applications, 2021, 57(7): 192-197.
|
[15] |
WAN Mengxiang, YAO Hanbing.
GAN Model for Malicious Web Training Data Generation
[J]. Computer Engineering and Applications, 2021, 57(6): 124-130.
|