[1] |
GAO Wenchao, REN Shengbo, TIAN Chi, ZHAO Shanshan.
Research on Method of Animated Avatar Generation Based on Multi-Level Generative Adversarial Networks
[J]. Computer Engineering and Applications, 2022, 58(9): 230-237.
|
[2] |
GAO Guangshang.
Survey on Attention Mechanisms in Deep Learning Recommendation Models
[J]. Computer Engineering and Applications, 2022, 58(9): 9-18.
|
[3] |
WEI Tingting, YUAN Weilin, LUO Junren, ZHANG Wanpeng.
Survey of Opponent Modeling Methods and Applications in Intelligent Game Confrontation
[J]. Computer Engineering and Applications, 2022, 58(9): 19-29.
|
[4] |
TANG Hong, LIU Shuang, JIU Yinghao, HE Yumeng, ZHU Shan.
Improved Study of Practical Byzantine Fault-Tolerant Algorithm
[J]. Computer Engineering and Applications, 2022, 58(9): 144-150.
|
[5] |
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling.
Survey of IoT Forensics
[J]. Computer Engineering and Applications, 2022, 58(8): 12-32.
|
[6] |
SHI Jie, YUAN Chenxiang, DING Fei, KONG Weixiang.
Survey of Building Target Detection in SAR Images
[J]. Computer Engineering and Applications, 2022, 58(8): 58-66.
|
[7] |
ZHOU Lina, CHANG Xiao, HU Feng.
Using Adjacent Structure Entropy to Determine Vital Nodes of Hypernetwork
[J]. Computer Engineering and Applications, 2022, 58(8): 76-82.
|
[8] |
LIU Runtao, DONG Qingyu, WU Haotian.
Direction Region Query Method Based on Voronoi Diagram
[J]. Computer Engineering and Applications, 2022, 58(8): 83-89.
|
[9] |
XU Jian, CHEN Pinghua, XIONG Jianbin.
Memory-Related Vulnerability Detection Method Based on Abstract Memory Model
[J]. Computer Engineering and Applications, 2022, 58(8): 96-108.
|
[10] |
ZHAO Jiang, MENG Chenyang, WANG Xiaobo, HAO Chongqing, LI Ran, LIU Huixian, WANG Zhaolei.
Modeling and Analysis of AGV Grid Method Based on Feature Points Extraction
[J]. Computer Engineering and Applications, 2022, 58(8): 156-167.
|
[11] |
CHEN Qin, CHEN Lanlan, JIANG Runqiang.
Emotion Recognition of EEG Based on Ensemble CapsNet
[J]. Computer Engineering and Applications, 2022, 58(8): 175-184.
|
[12] |
XIAO Jinzhuang, LI Ruipeng, JI Mengmeng.
Speaker Verification Based on Teacher-Free Knowledge Distillation Model
[J]. Computer Engineering and Applications, 2022, 58(8): 198-203.
|
[13] |
LI Qingliang, ZHANG Zhi’an, MA Haonan, ZHOU Hemiao.
Gait Optimization of Anti-Gravity Shift of Quadruped Robot
[J]. Computer Engineering and Applications, 2022, 58(7): 303-310.
|
[14] |
YANG Xi, YAN Jie, WANG Wen, LI Shaoyi, LIN Jian.
Research and Prospect of Brain-Inspired Model for Visual Object Recognition
[J]. Computer Engineering and Applications, 2022, 58(7): 1-20.
|
[15] |
WANG Zhiyong, XING Kai, DENG Hongwu, LI Yaming, HU Xuan.
Adversarial Attack Against ResNeXt Based on Few-Shot Learning and Causal Intervention
[J]. Computer Engineering and Applications, 2022, 58(7): 68-76.
|