[1] |
DENG Lifang, DANG Jianwu, WANG Yangping, WANG Song.
Steganalysis of Spatial Image Based on Hybrid Kernel Feature Mapping
[J]. Computer Engineering and Applications, 2021, 57(9): 118-125.
|
[2] |
Hasan Wumaier, Sirajahmat Ruzmamat, Xireaili Hairela, LIU Wenqi, Tuergen Yibulayin, WANG Liejun, Wayit Abulizi.
Bi-directional Uyghur-Chinese Neural Machine Translation with Marked Syllables
[J]. Computer Engineering and Applications, 2021, 57(4): 161-168.
|
[3] |
ZHANG Huiyu, CHEN Qingxin, MAO Ning.
AGV Configuration Optimization of Manufacturing System with Random Batch Material Handling
[J]. Computer Engineering and Applications, 2021, 57(4): 245-251.
|
[4] |
ZHANG Gongkai, CHEN Caixue, ZHENG Tuo.
Application of Improved Whale Optimization Algorithm in Ordered Charging of Electric Vehicle
[J]. Computer Engineering and Applications, 2021, 57(4): 272-278.
|
[5] |
ZHANG Rui, SONG Jingzhou, LI Sihao.
Object Tracking with Anchor-Free and Online Updating
[J]. Computer Engineering and Applications, 2021, 57(20): 210-220.
|
[6] |
WANG Yong,ZHAO Xuhui,LI Xiaoguang,XIAO Ling.
Fast Nearest-Neighbor Searching Method for Collaborative Filtering
[J]. Computer Engineering and Applications, 2021, 57(17): 96-105.
|
[7] |
LI Song, LIU Zhe, TANG Xiaomei, WU Jian, WANG Feixue.
Fixed-Point Iterated Huber-Based Robust Cubature Kalman Filter
[J]. Computer Engineering and Applications, 2021, 57(16): 90-96.
|
[8] |
LIU Chang, Abudukelimu·Abulizi, YAO Dengfeng, Halidanmu·Abudukelimu.
Survey for Uyghur Morphological Analysis
[J]. Computer Engineering and Applications, 2021, 57(15): 42-61.
|
[9] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[10] |
KANG Kai, WANG Xuyang, ZHANG Jing.
Pricing Strategy of Bilateral Ride-Hailing Platform Based on Duopoly Competition in Sharing Economy
[J]. Computer Engineering and Applications, 2021, 57(13): 227-232.
|
[11] |
CHEN Tiantian, HE Xiuqing, GE Wenshuang, HE Juhou.
Method and Application of Massive Online Collaborative Learning Grouping
[J]. Computer Engineering and Applications, 2021, 57(1): 92-98.
|
[12] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[13] |
YAN jianjun, CHEN Songye, YAN Haixia, WANG Yiqin, GUO Rui.
Wrist Pulse Analysis and Recognition Based on Recurrence Plot and Convolution Neural Network
[J]. Computer Engineering and Applications, 2020, 56(7): 170-175.
|
[14] |
ZHAO Tong, HUANG Zheng, WANG Xiuchao, LI Miao, ZHANG Yun, ZHENG Xiujuan, LIU Kai.
Recognition Research on Concealing Behavior in Psychological Test
[J]. Computer Engineering and Applications, 2020, 56(20): 158-164.
|
[15] |
GUO Sheng, ZHONG Zhaoman, LI Cunhua.
Multi-view Subspace Clustering Network Based on Deep Autoencoder
[J]. Computer Engineering and Applications, 2020, 56(17): 60-68.
|