[1] |
LI Hongwei, CHEN Liang, BAI Jingbo.
Projection Pursuit Threat Target Assessment Model Based on Chaotic Moth-Flame Optimization Algorithm
[J]. Computer Engineering and Applications, 2020, 56(2): 152-157.
|
[2] |
CHEN Zhongyun, ZHANG Damin, XIN Ziyun, ZHANG Huijuan, YAN Wei.
Salp Swarm Algorithm Using Chaotic and Elite Centroid Stretching Mechanism
[J]. Computer Engineering and Applications, 2020, 56(10): 44-50.
|
[3] |
ZHU Shuqin, LIU Rongyue, ZHOU Ranran, WANG Wenhong.
New Image Encryption Algorithm Based on Key Dynamic Selection Mechanism
[J]. Computer Engineering and Applications, 2019, 55(9): 56-64.
|
[4] |
WANG Yong, FANG Xiaoqiang, WANG Ying.
Hyperchaos System and AES Combined with Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(8): 164-170.
|
[5] |
HUANG Yuda1, WANG Yiran2, NIU Sijie3.
Analysis and Optimization of GSO Algorithm Based on Chaos and Self-Adaptive Search Strategy
[J]. Computer Engineering and Applications, 2019, 55(3): 147-153.
|
[6] |
WANG Yong, YANG Jin, WANG Ying.
Image Encryption Algorithm Based on Improved Henon Hyperchaotic System Combined with AES Algorithm
[J]. Computer Engineering and Applications, 2019, 55(22): 180-186.
|
[7] |
HE Zhiming, LI Wenjing.
Flower Pollination Algorithm Based on Dynamic Global Search and Cauchy Mutation
[J]. Computer Engineering and Applications, 2019, 55(19): 74-80.
|
[8] |
XIE Guobo, WU Zhenyu.
Chaotic Image Encryption Algorithm Based on Wavelet Transform and Gravity Model
[J]. Computer Engineering and Applications, 2019, 55(13): 100-105.
|
[9] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[10] |
YANG Chaojie, PEI Yijian, LIU Peng.
Research on Three-Dimensional Space Path Planning Based on Improved Particle Swarm Optimization Algorithm
[J]. Computer Engineering and Applications, 2019, 55(11): 117-122.
|
[11] |
ZHU Shuqin1, WANG Wenhong1, SUN Zhonggui2.
Security Analysis and Improvement of Chaotic Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 115-122.
|
[12] |
ZHU Shuqin, WANG Wenhong, LI Junqing.
Designing a class of quadratic polynomial chaotic maps and their pseudo random number generator
[J]. Computer Engineering and Applications, 2018, 54(9): 84-88.
|
[13] |
XIE Goubo, ZHU Runying.
Image encryption algorithm based on compound cascade chaotic
[J]. Computer Engineering and Applications, 2018, 54(8): 189-194.
|
[14] |
SHI Fei, ZHANG Hongmei, ZHANG Xiangli.
Image encryption algorithm based on chaotic map and DNA coding
[J]. Computer Engineering and Applications, 2018, 54(5): 91-95.
|
[15] |
WANG Yong, ZHU Guang, WANG Ying.
Hyperchaotic image encryption algorithm based on cellular neural network and AES algorithm
[J]. Computer Engineering and Applications, 2018, 54(21): 194-200.
|