[1] |
ZHANG Fang, WU Jie, YANG Yue.
Emission Reduction and Coordination Decision in Cold Chain Logistics Service Supply Chain Considering Risk Aversion
[J]. Computer Engineering and Applications, 2021, 57(24): 259-267.
|
[2] |
AN Lei, HAN Zhonghua, LIN Shuo, SHANG Wenli.
Research on GAN-SDAE-RF Model for Network Intrusion Detection
[J]. Computer Engineering and Applications, 2021, 57(21): 155-164.
|
[3] |
ZHOU Yamin, YANG Yongsheng, ZHONG Meisu, WANG Yusheng, XU Xueqian.
Scheduling of Crossing Double ASC in Yard of Automated Terminals
[J]. Computer Engineering and Applications, 2021, 57(2): 251-256.
|
[4] |
ZHANG Fang, WU Jie, YANG Yue.
Green Supply Chain Decision Making Considering Government Subsidies and Social Responsibility
[J]. Computer Engineering and Applications, 2021, 57(17): 237-245.
|
[5] |
KANG Kai, WANG Xuyang, ZHANG Jing.
Pricing Strategy of Bilateral Ride-Hailing Platform Based on Duopoly Competition in Sharing Economy
[J]. Computer Engineering and Applications, 2021, 57(13): 227-232.
|
[6] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[7] |
WU Chunmei, HU Junhao, YIN Jianghua.
Using Improved Generative Adversarial Network for Human Pose Estimation
[J]. Computer Engineering and Applications, 2020, 56(8): 96-103.
|
[8] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[9] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[10] |
ZHANG Jianjun, ZHAO Qilan.
#br#
Research on Choice and Evolution of Supply Chain Structure Led by Online Retailer
[J]. Computer Engineering and Applications, 2020, 56(24): 249-259.
|
[11] |
CHEN Hong, ZHAO Jianzhi, XIAO Chenglong, CHEN Jianhu, XIAO Yue.
Research on Improved Intrusion Detection Model of ADASYN-SDA
[J]. Computer Engineering and Applications, 2020, 56(2): 97-105.
|
[12] |
GE Xiaoyue, ZHOU Tianyang, ZANG Yichao, ZHU Junhu.
Dynamic Defense Strategy Selection Method Based on Stackelberg Security Game
[J]. Computer Engineering and Applications, 2020, 56(17): 129-135.
|
[13] |
YUE Peng, HOU Lingyan, YANG Dali, TONG Qiang.
XLC-Stacking Method for Disease Diagnosis Based on XGBoost Feature Selection
[J]. Computer Engineering and Applications, 2020, 56(17): 136-141.
|
[14] |
HAN Zhengtao, ZHANG Wuyi.
Revenue Sharing Mechanism of Knowledge Transfer in Collaborative Innovation of Supply Chain
[J]. Computer Engineering and Applications, 2020, 56(16): 234-240.
|
[15] |
DAI Qianlong, SUN Wei.
Vehicle Identification Based on Improved Sparse Stack Coding
[J]. Computer Engineering and Applications, 2020, 56(1): 136-141.
|