[1] |
ZHENG Fengxian, WANG Xiali, HE Dandan, LI Nini, FU Yangyang, YUAN Shaoxin.
Survey of Single Image Defogging Algorithm
[J]. Computer Engineering and Applications, 2022, 58(3): 1-14.
|
[2] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[3] |
HUI Hui, GOU Bo, WANG Ying.
Secure Transmission Scheme for Successive Relaying Networks Under Eavesdropping Environment
[J]. Computer Engineering and Applications, 2021, 57(4): 77-82.
|
[4] |
XIAO Liejun, BAO Wenjing, GAO Qingji.
Modeling Research of Rotorcraft Integrated Positioning Based on CPS Framework
[J]. Computer Engineering and Applications, 2021, 57(21): 287-294.
|
[5] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[6] |
PENG Xiaohong, LIANG Zixiang, ZHANG Jun, CHEN Rongfa.
Review of Underwater Image Preprocessing Based on Deep Learning
[J]. Computer Engineering and Applications, 2021, 57(13): 43-54.
|
[7] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[8] |
XU Xinjian, QIU Runhe.
Physical Layer Security of Cognitive Relay Network
[J]. Computer Engineering and Applications, 2020, 56(6): 79-85.
|
[9] |
MENG Yuan, TU Shanshan, YU Jinliang.
Detection Scheme of Impersonation Attack Based on DQL Algorithm in Fog Computing
[J]. Computer Engineering and Applications, 2020, 56(10): 63-68.
|
[10] |
YUE Chunyu,MA Yizhong,ZHANG Jianxia.
Multi-Objective Surrogate Optimization Algorithm Combining Kriging and Physical Programming
[J]. Computer Engineering and Applications, 2019, 55(21): 240-246.
|
[11] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|
[12] |
HE Zhangqing1, LI Hong2, WAN Meilin3, WU Tiezhou1.
Authentication and session key exchange protocol based on Physical Uncolonable Function
[J]. Computer Engineering and Applications, 2018, 54(18): 17-21.
|
[13] |
ZHANG Jing, WANG Liang, FAN Hongbo.
Modeling and analysis of CPS physical entity spatio-temporal state
[J]. Computer Engineering and Applications, 2018, 54(14): 41-44.
|
[14] |
ZHANG Jin, CHENG Lianglun.
Unsupervised graphical model for anomaly detection in distributed CPS
[J]. Computer Engineering and Applications, 2018, 54(12): 110-115.
|
[15] |
YANG Yatao1, ZHANG Songtao1, LI Zichen1,2, WANG Peidong1, QU Ming1.
Design and implementation for physical layer of serial ATA revision 3.0 based on FPGA
[J]. Computer Engineering and Applications, 2017, 53(20): 38-42.
|