[1] |
HAN Weiyu, CHENG Longsheng.
Research on Roling Bearing Failure Mode Classification Based on MTS and SVM
[J]. Computer Engineering and Applications, 2021, 57(6): 239-246.
|
[2] |
WEN Jiebin, YANG Wenzhong, MA Guoxiang, ZHANG Zhihao, LI Hailei.
Micro-expression Recognition Based on Apex Frame Optical Flow and Convolutional Autoencoder
[J]. Computer Engineering and Applications, 2021, 57(4): 127-133.
|
[3] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[4] |
XU Xianfeng, CAI Lulu, ZHANG Li.
Photovoltaic Power Generation Prediction Algorithm Based on MLP and DBN
[J]. Computer Engineering and Applications, 2021, 57(3): 266-272.
|
[5] |
LI Junxia, ZHANG Qin, ZHENG Guimei.
Overview of Human Posture Recognition by Ultra-wideband Radar
[J]. Computer Engineering and Applications, 2021, 57(3): 14-23.
|
[6] |
CHEN Fujian, XIE Weixin, XIA Ting.
Adaptive Anti-occlusion Target Tracking Algorithm Based on LCT+
[J]. Computer Engineering and Applications, 2021, 57(22): 190-198.
|
[7] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[8] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[9] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[10] |
CHEN Feiyu, YUE Wenbin, RAO Yinglu, XING Jinhao, MA Xiaojing.
Autonomous Precision Landing of Drone Based on Improved TLD Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 247-254.
|
[11] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[12] |
MA Ling, LUO Xiaoshu, JIANG Pinqun.
Research on Dot Matrix Character Recognition Based on Template Matching and Support Vector Machine
[J]. Computer Engineering and Applications, 2020, 56(4): 134-139.
|
[13] |
ZHANG Zhonglin, FENG Yibang, ZHAO Zhongkai.
Oversampling Method for Unbalanced Data Sets Based on SVM
[J]. Computer Engineering and Applications, 2020, 56(23): 220-228.
|
[14] |
CHEN Hong, WANG Runting, XIAO Chenglong, GUO Pengfei, HUANG Jie, CHEN Honglin.
Research on Intrusion Detection Model Based on DBN-XGBDT
[J]. Computer Engineering and Applications, 2020, 56(22): 83-91.
|
[15] |
DI Chong, LI Tong.
Network Unknown Attack Detection with Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(22): 109-116.
|