[1] |
GAO Shujing, WANG Chenglong, DONG Tingkun.
Optimized Adaboost Face Detection Based on ZYNQ
[J]. Computer Engineering and Applications, 2020, 56(6): 201-206.
|
[2] |
GAO Lianxin,WEI Wei, HU Yongzhi, FENG Yuhao.
Video Early Smoke Detection Based on Motion Extraction and 3D Convolutional Neural Network
[J]. Computer Engineering and Applications, 2020, 56(17): 266-272.
|
[3] |
ZHANG Hua, CAO Lin.
Face Sketch Synthesis Method Combining pHash and Sparse Coding
[J]. Computer Engineering and Applications, 2019, 55(22): 187-194.
|
[4] |
XIAO Zhenjiu1, 2, LI Nan1, WANG Yongbin2, JIANG Zhengtao2, CHEN Hong1.
Zero watermarking scheme for medical image temper location based on hyper-chaos encryption
[J]. Computer Engineering and Applications, 2017, 53(7): 115-120.
|
[5] |
LI Hongqi, FENG Haibo, ZHANG Wei, YANG Zhongguo, SONG Weicheng.
Improved eliminating duplicated web pages based on feature vector of character set
[J]. Computer Engineering and Applications, 2017, 53(2): 53-57.
|
[6] |
ZHENG Jiming1, 2, CUI Yuyan1, GENG Jinling2, CHEN Long1.
Detection of copy-move forgery in image based on DWT and ORB
[J]. Computer Engineering and Applications, 2017, 53(11): 187-191.
|
[7] |
LIU Jian1, WANG Ling1, WU Tong1,2.
Improved image encryption algorithm based on cascade chaotic system
[J]. Computer Engineering and Applications, 2015, 51(12): 68-73.
|
[8] |
GUO Liang, YANG Jinmin.
Research of incremental extraction based on MD5 and HASH algorithm
[J]. Computer Engineering and Applications, 2014, 50(23): 136-139.
|
[9] |
XI Yewen, YANG Jinmin.
Duplicate data delete technology based on double bloom filter
[J]. Computer Engineering and Applications, 2014, 50(23): 198-202.
|
[10] |
GAO Xiang1, LI Bing2.
Research on method to detect reduplicative Chinese short texts
[J]. Computer Engineering and Applications, 2014, 50(16): 192-197.
|
[11] |
HUANG Qiulan, CHENG Yaodong, CHEN Gang.
Research on hash algorithm for distributed storage system
[J]. Computer Engineering and Applications, 2014, 50(1): 1-4.
|
[12] |
LI Zhican1, WANG Yi1,2,3, LI Renfa1,2,3.
Research of reconfigurable Gr?stl algorithm on FPGA platform
[J]. Computer Engineering and Applications, 2012, 48(6): 49-52.
|
[13] |
GAO Bao-jian,FENG Feng.
New image authentication algorithm with anti-JPEG compression
[J]. Computer Engineering and Applications, 2010, 46(23): 190-193.
|
[14] |
TANG He-ping,HUANG Shu-guang,WU Zhi-yong.
Method based on data flow analysis to understanding binary program
[J]. Computer Engineering and Applications, 2010, 46(23): 64-66.
|
[15] |
CHEN Shao-hui1,2,ZHAI Xiao-ning1,2,YAN Na1,2,SU Guo-xing1,2.
Cryptanalysis of deciphering MD5 algorithm
[J]. Computer Engineering and Applications, 2010, 46(19): 109-112.
|