[1] |
TAN Shuqiu, TANG Guofang, TU Yuanya, ZHANG Jianxun, GE Panjie.
Classroom Monitoring Students Abnormal Behavior Detection System
[J]. Computer Engineering and Applications, 2022, 58(7): 176-184.
|
[2] |
YANG Jiafeng, TONG Jijun, JIANG Lurong, PAN Zheyi.
Design and Implementation of Non-invasive Sleeping Breaths Monitoring System
[J]. Computer Engineering and Applications, 2022, 58(5): 302-308.
|
[3] |
PEI Junling, CHEN Lusheng.
Improvement of Preimage Attack on 4-Round Keccak-256 by Solving Algebraic Systems
[J]. Computer Engineering and Applications, 2022, 58(5): 119-123.
|
[4] |
YANG Qisheng, LI Wenkuan, YANG Xiaofeng, YUE Linxi, LI Haifang.
Improved YOLOv5 Method for Detecting Growth Status of Apple Flowers
[J]. Computer Engineering and Applications, 2022, 58(4): 237-246.
|
[5] |
JIAN Chun, QING Xiaoxia, WANG Bo.
Regulatory Method of Smart Water Data Based on Private Blockchain
[J]. Computer Engineering and Applications, 2022, 58(4): 304-312.
|
[6] |
WANG Pai, WU Fan, WANG Mei, QIN Xuebin.
Attention Grading Modeling Based on Schulte Grid and LSTM
[J]. Computer Engineering and Applications, 2022, 58(15): 133-140.
|
[7] |
REN Nan, MA Yuanyuan.
Research on Evolutionary Game and Strategy of DPoS Consensus Mechanism Improvement
[J]. Computer Engineering and Applications, 2022, 58(12): 102-111.
|
[8] |
WANG Lin, CHAI Jiangyun.
Research on Deep Neural Network in Multi-scene Vehicle Attribute Recognition
[J]. Computer Engineering and Applications, 2021, 57(9): 162-167.
|
[9] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[10] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[11] |
KONG Fangfang, SONG Beibei.
Improved YOLOv3 Panoramic Traffic Monitoring Target Detection
[J]. Computer Engineering and Applications, 2020, 56(8): 20-25.
|
[12] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[13] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
[14] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|
[15] |
ZHANG Chengbiao, TONG Baohong, CHENG Jin, ZHANG Bingli, ZHANG Run.
Improved Yolo_v2 Illegal Vehicle Detection Method
[J]. Computer Engineering and Applications, 2020, 56(20): 104-110.
|