[1] |
ZOU Chengming, HU Youpu.
Monocular Depth Estimation in Outdoor Scene with Generative Adversarial Network
[J]. Computer Engineering and Applications, 2021, 57(6): 176-183.
|
[2] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[3] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[4] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[5] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[6] |
MI Yuan, TANG Hengliang.
Rumor Identification Research Based on Graph Convolutional Network
[J]. Computer Engineering and Applications, 2021, 57(13): 161-167.
|
[7] |
TANG Huanling, LIU Yanhong, ZHENG Han, DOU Quansheng, LU Mingyu.
Imbalanced Text Categorization Method with SLDA Topic Model
[J]. Computer Engineering and Applications, 2021, 57(12): 144-154.
|
[8] |
SONG Lili, LI Bin, ZHAO Junya, LIU Guofeng.
Normality Resampling of Improved Metric Learning Method for Person Re-Identification
[J]. Computer Engineering and Applications, 2020, 56(8): 158-165.
|
[9] |
HAN Song, HAN Qiuhong.
Review of Semi-Supervised Learning Research
[J]. Computer Engineering and Applications, 2020, 56(6): 19-27.
|
[10] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[11] |
CHEN Hong, WANG Runting, XIAO Chenglong, GUO Pengfei, HUANG Jie, CHEN Honglin.
Research on Intrusion Detection Model Based on DBN-XGBDT
[J]. Computer Engineering and Applications, 2020, 56(22): 83-91.
|
[12] |
DI Chong, LI Tong.
Network Unknown Attack Detection with Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(22): 109-116.
|
[13] |
WANG Pan, SONG Xuehua, WANG Changda, CHEN Feng, XU Xiaqiang, CAI Guanyu.
Intrusion Detection Method Based on Improved Deep Belief Network
[J]. Computer Engineering and Applications, 2020, 56(20): 87-92.
|
[14] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[15] |
GOU Jijun, LI Junhua, CHEN Chen, CHEN Yiming, LV Yida.
Network Intrusion Detection Method Based on Random Forest
[J]. Computer Engineering and Applications, 2020, 56(2): 82-88.
|