[1] |
NI Xueli, LIANG Guangjun.
Recovery Method of WeChat Revoking Message Based on Dynamic Memory Analysis
[J]. Computer Engineering and Applications, 2021, 57(23): 146-153.
|
[2] |
DAI Rui, SONG Tian.
Self-Adaptive Pseudo-Random Sequence Hybrid Network Covert Channel Construction Method
[J]. Computer Engineering and Applications, 2021, 57(17): 122-129.
|
[3] |
ZHANG Xiaonan, JIANG Shuai, NAN Jingwen.
Research on Multi-depots Vehicle Routing Problem with Semi-flexible Coverage Service
[J]. Computer Engineering and Applications, 2021, 57(10): 225-232.
|
[4] |
YANG Geying, SHEN Xiajiong, SHI Xianjin, ZHANG Lei.
Visualization of Association Rules in Context of Concept Lattices
[J]. Computer Engineering and Applications, 2021, 57(1): 84-91.
|
[5] |
ZHU Zhishen,LING Jie,LIN Peng.
Data Integrity Checking Technology of Industrial Control System Based on Covert Channel
[J]. Computer Engineering and Applications, 2020, 56(9): 125-130.
|
[6] |
CHEN Chenglong, QIU Zhicheng, DU Qiliang, TIAN Lianfang, LIN Bin, LI Miao.
Indoor Robot Global Relocation Method Based on Netvlad Neural Network
[J]. Computer Engineering and Applications, 2020, 56(9): 175-182.
|
[7] |
ZHANG Min, ZENG Biqing, HAN Xuli, XU Ruyang.
DAPC:Dual Attention and Pointer-Coverage Network Based Summarization Model
[J]. Computer Engineering and Applications, 2020, 56(8): 149-157.
|
[8] |
LIU Jun, WANG Xiuyun, REN Fuji.
Test Strategy for 2.5D ICs Using Auxiliary Interposer and E-Fuse
[J]. Computer Engineering and Applications, 2020, 56(6): 271-278.
|
[9] |
ZHANG Jianhua, LI Fangfang, YANG Lan.
Research on Matching Supply and Demand of Case Knowledge Based on PFS and RS
[J]. Computer Engineering and Applications, 2020, 56(23): 139-145.
|
[10] |
XIE Zhangwei, CUI Zhanqi, ZHENG Liwei, ZHANG Zhihua.
Dynamic Symbolic Execution Based on Assistance of Genetic Algorithm
[J]. Computer Engineering and Applications, 2020, 56(21): 231-236.
|
[11] |
WANG Haoxiang, LI Na, LI Qiangyi.
Research on Improved Virtual Force Maximum Coverage Location Algorithm
[J]. Computer Engineering and Applications, 2020, 56(20): 220-225.
|
[12] |
YANG Haoyun, WANG Junfeng, LIU Jiayong, TANG Zhangguo.
Research and Implementation of Covert Channel of SSL Protocol
[J]. Computer Engineering and Applications, 2020, 56(20): 67-72.
|
[13] |
HAN Yulao.
Coverage Hole Repair Algorithm Based on Non-parallel Dichotomy
[J]. Computer Engineering and Applications, 2020, 56(12): 87-92.
|
[14] |
XIE Shengxu, WEI Wei, XING Changyou, ZHANG Guomin.
Research on LDoS Attack Defense Technology for SDN Topology Discovery
[J]. Computer Engineering and Applications, 2020, 56(10): 88-93.
|
[15] |
CHEN Hongqian1,2, CHENG Zhongjuan1,2, YANG Qianyu1,2, LI Hui3.
Parallel Coordinate Improvement Method for Category Data Analysis
[J]. Computer Engineering and Applications, 2019, 55(8): 175-181.
|