[1] |
JIANG Peihe, WANG Chenxu, GUO Gang, WEI Yinsheng.
Research on Hardware Trojan Detection for FPGA Application
[J]. Computer Engineering and Applications, 2021, 57(20): 119-124.
|
[2] |
YU Juan,LUO Shun.
Detection Method of Illegal Building Based on YOLOv5
[J]. Computer Engineering and Applications, 2021, 57(20): 236-244.
|
[3] |
ZHANG Wu, ZHOU Xingyu, ZOU Junhua, PAN Zhisong, DUAN Yexin, CHEN Jun.
Adversarial Attack Algorithm Based on Erosion Batch Normalization
[J]. Computer Engineering and Applications, 2021, 57(16): 116-124.
|
[4] |
BAI Bo, XIE Gang, XU Xinying.
Research on Taillight Detection Algorithm for Multi-Scale Cascade R-FCN
[J]. Computer Engineering and Applications, 2020, 56(6): 194-200.
|
[5] |
ZHANG Man, XIA Zhanguo, LIU Bing, ZHOU Yong.
Character Level Text Classification Based on Fully Convolutional Neural Network
[J]. Computer Engineering and Applications, 2020, 56(5): 166-172.
|
[6] |
GUO Mingang, GONG He.
Research on AlexNet Improvement and Optimization Method
[J]. Computer Engineering and Applications, 2020, 56(20): 124-131.
|
[7] |
LI Ximing, WU Jiarun, WU Shaoqian, GUO Yubin, MA Sha.
Key Resilient Encryption Algorithm Based on Generative Adversarial Networks
[J]. Computer Engineering and Applications, 2020, 56(10): 69-74.
|
[8] |
HAN Bin, YANG Dali.
Normalization of Printed Images Based on Transmission Transformation
[J]. Computer Engineering and Applications, 2019, 55(23): 188-193.
|
[9] |
LI Min, ZHANG Guohao, ZENG Jianwei, YANG Xiaofeng, HU Xiaomin.
Inception Model of Deep Convolutional Neural Network for Image Denoising
[J]. Computer Engineering and Applications, 2019, 55(20): 139-144.
|
[10] |
WANG Yanzhe, ZHANG Limin, ZHANG Bingqiang, LI Zhenyu.
End-to-End Mandarin Speech Recognition with Improved Convolution Input
[J]. Computer Engineering and Applications, 2019, 55(17): 143-149.
|
[11] |
WANG Huali1, ZOU Junzhong1, ZHANG Jian1, WEI Zuochen1, WANG Chunmei2.
Fast image classification algorithm based on deep convolutional neural network
[J]. Computer Engineering and Applications, 2017, 53(13): 181-188.
|
[12] |
XIONG Fangmin1, CEN Yusen1, ZENG Biqing2.
Robust face recognition based on fusion of entropy weighted method and local matching Gabor features
[J]. Computer Engineering and Applications, 2016, 52(5): 134-140.
|
[13] |
LIU Enyu, ZHU Hainie, XIE Jianlei.
Single imagine defogging based on transmission normalization
[J]. Computer Engineering and Applications, 2016, 52(20): 200-203.
|
[14] |
ZHANG Yankai1, BAO Fang2, WANG Shitong1.
Protection-type transfer learning clustering algorithm with cosine distance metric
[J]. Computer Engineering and Applications, 2015, 51(23): 131-138.
|
[15] |
ZHOU Wei1, CHENG Yong2, CAO Xuehong1,2.
Face recognition based on illumination normalization and block-based completed local binary pattern
[J]. Computer Engineering and Applications, 2015, 51(11): 145-149.
|