[1] |
XU Yinxiang, CHEN Qidong, SUN Jun.
Text Adversarial Attack Method Applying Based on Improved Quantum Behaved Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2022, 58(9): 175-180.
|
[2] |
GAO Wenchao, REN Shengbo, TIAN Chi, ZHAO Shanshan.
Research on Method of Animated Avatar Generation Based on Multi-Level Generative Adversarial Networks
[J]. Computer Engineering and Applications, 2022, 58(9): 230-237.
|
[3] |
WANG Zhaoqian, KONG Weiwei, TENG Jinbao, TIAN Qiaoxin.
Low Illumination Image Enhancement Method Based on DenseNet GAN
[J]. Computer Engineering and Applications, 2022, 58(8): 214-220.
|
[4] |
LU Peng, CHEN Jinyu, ZOU Guoliang, WAN Ying, ZHENG Zongsheng, WANG Zhenhua.
Personalized Handwritten Chinese Character Generation Method for Unsupervised Image Translation
[J]. Computer Engineering and Applications, 2022, 58(8): 221-229.
|
[5] |
HU Xiaobing, MENG Xiangzhi.
Many-to-Many Path Planning Method for Material Distribution Under Dynamic Disaster Environment
[J]. Computer Engineering and Applications, 2022, 58(8): 297-306.
|
[6] |
SHEN Xulin, LI Chaobo, LI Hongjun.
Overview on Video Abnormal Behavior Detection of GAN via Human Density
[J]. Computer Engineering and Applications, 2022, 58(7): 21-30.
|
[7] |
WANG Zhiyong, XING Kai, DENG Hongwu, LI Yaming, HU Xuan.
Adversarial Attack Against ResNeXt Based on Few-Shot Learning and Causal Intervention
[J]. Computer Engineering and Applications, 2022, 58(7): 68-76.
|
[8] |
WANG Jing, WANG Kai, YAN Yingjian.
Research on Side Channel Attack Technology Based on Conditional Generation Against Network
[J]. Computer Engineering and Applications, 2022, 58(6): 110-117.
|
[9] |
WEI Chengfeng, DONG Hongwei, XU Xiaochun.
Attribute Editable Person Image Synthesis Based on Spatial Transformation
[J]. Computer Engineering and Applications, 2022, 58(6): 219-226.
|
[10] |
MA Menghao, WANG Zhe.
Semi-supervised Learning Method via Wasserstein Distance Under Small Sample Condition
[J]. Computer Engineering and Applications, 2022, 58(5): 193-199.
|
[11] |
LI Peiyang, LI Xuan, CHEN Junjie, CHEN Yongle.
Adversarial Sample Generation for Evading Botnet Traffic Detection
[J]. Computer Engineering and Applications, 2022, 58(4): 126-133.
|
[12] |
JU Sibo, XU Jing, LI Yanfang.
Text-to-Single Image Method Based on Self-Attention
[J]. Computer Engineering and Applications, 2022, 58(3): 249-258.
|
[13] |
MI Aizhong, ZHANG Wei, QIAO Yingxu, XU Chengjing, HUO Zhanqiang.
Review of Research on Facial Makeup Transfer
[J]. Computer Engineering and Applications, 2022, 58(2): 15-26.
|
[14] |
WU Chenwen, LIANG Yuxin, TIAN Hongyan.
Research on COVID-19 CT Image Classification Method Based on Improved Convolutional Neural Network
[J]. Computer Engineering and Applications, 2022, 58(2): 225-234.
|
[15] |
TAO Qisheng, PENG Cheng, MAN Junfeng, LIU Yi.
Two-Step Transfer Learning Method for Bearing Fault Diagnosis
[J]. Computer Engineering and Applications, 2022, 58(2): 303-312.
|