[1] |
ZHOU Youhang, ZHAO Hanyun, LIU Hanjiang, LI Yuze, XIAO Yuqin.
Self-Learning Gait Planning Method for Biped Robot Using DDPG
[J]. Computer Engineering and Applications, 2021, 57(6): 254-259.
|
[2] |
NI Zongjun, CHEN Hui, ZHANG Yun, SU Min, ZHENG Xiujuan.
Non-contact Physiological Parameter Estimation Method Based on Adaptive Denoising
[J]. Computer Engineering and Applications, 2021, 57(5): 153-160.
|
[3] |
CAI Dongli, ZHONG Qinghua, ZHU Yongsheng, LIAO Jinxiang, HAN Maizhi.
EEG Emotion Recognition Using Convolutional Neural Network with 3D Input
[J]. Computer Engineering and Applications, 2021, 57(5): 161-167.
|
[4] |
WANG Peng, YE Xueyi, WANG Tao, QIAN Dingwei.
Face Recognition Based on Double Variation and Double Space Local Directional Pattern
[J]. Computer Engineering and Applications, 2021, 57(4): 91-99.
|
[5] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[6] |
MA Manfu, GUO Chenbiao, LI Yong, ZHANG Zhongying, ZHANG Qiang, WANG Changqing.
Research on Heterogeneity of Attention Flow Network Based on Structural Entropy
[J]. Computer Engineering and Applications, 2021, 57(23): 98-105.
|
[7] |
YI Lingzhi, WANG Shitong, YI Fang, DENG Dong, YI Zhimin, JIANG Peng.
Wind Farm Ultra-Short-Term Wind Speed Prediction Based on EEMDSE-ILSTM
[J]. Computer Engineering and Applications, 2021, 57(22): 288-294.
|
[8] |
JIANG Kui, QIU Yuandong, ZHENG Haocheng.
ICMPv6 DDoS Attack Detection Method Based on Information Entropy and LSTM
[J]. Computer Engineering and Applications, 2021, 57(21): 148-154.
|
[9] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[10] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[11] |
SONG Shijie, CHEN Kaiyan, ZHANG Yang.
Security Evaluation Framework of Deep Learning Side Channel Analysis from Information Entropy
[J]. Computer Engineering and Applications, 2021, 57(17): 138-146.
|
[12] |
HUANG Lin, YUAN Xiujiu.
General Formula and Generating Algorithm of Improved Hesitant Fuzzy Linguistic Entropy
[J]. Computer Engineering and Applications, 2021, 57(16): 97-107.
|
[13] |
ZHANG Junfang, ZHOU Ligang, ZHANG Chunfang, XU Xin, XIAO Jian.
Application of Interval-Valued Pythagorean Hesitant Fuzzy Continuous Entropy-Grey Relative Degree
[J]. Computer Engineering and Applications, 2021, 57(15): 207-214.
|
[14] |
ZHANG Nianpeng, WU Xu, ZHU Qiang.
Entropy-Based Oversampling Framework
[J]. Computer Engineering and Applications, 2021, 57(13): 96-101.
|
[15] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|