[1] |
DU Yao.
Android Malicious Family Detection Algorithm Based on Local Optimization Matching
[J]. Computer Engineering and Applications, 2021, 57(8): 84-90.
|
[2] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[3] |
LIU Chang, QIU Weigen, ZHANG Lichen.
Person Re-identification Based on Deformable Mask Alignment Convolution Model
[J]. Computer Engineering and Applications, 2021, 57(5): 146-152.
|
[4] |
LIU Teng, CHEN Heng, LI Guanyu.
Knowledge Graph Representation Learning Method Jointing FOL Rules
[J]. Computer Engineering and Applications, 2021, 57(4): 100-107.
|
[5] |
Hasan Wumaier, Sirajahmat Ruzmamat, Xireaili Hairela, LIU Wenqi, Tuergen Yibulayin, WANG Liejun, Wayit Abulizi.
Bi-directional Uyghur-Chinese Neural Machine Translation with Marked Syllables
[J]. Computer Engineering and Applications, 2021, 57(4): 161-168.
|
[6] |
YANG Yanan, ZHANG Hongming, LI Hanghao, YANG Jiangtao, QUAN Kai.
Research on UAV Terrace Recognition Method Based on FCN and DenseCRF Model
[J]. Computer Engineering and Applications, 2021, 57(3): 222-230.
|
[7] |
XIE Yinggang, WANG Quan.
Summary of Dynamic Gesture Recognition Based on Vision
[J]. Computer Engineering and Applications, 2021, 57(22): 68-77.
|
[8] |
SONG Haonan, ZHAO Gang, WANG Xingfen.
Knowledge Reasoning Method Combining Knowledge Representation with Deep Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(19): 189-197.
|
[9] |
XIAO Yani, FAN Xinyue, CHEN Wenfeng.
Research on Person Re-identification Based on Integrating Local Features Under Multi-branches
[J]. Computer Engineering and Applications, 2021, 57(18): 213-219.
|
[10] |
TONG Wenlin, CHEN Dewang, HUANG Yunhu, LYU Yisheng.
Fuzzy System Optimization Method Based on Simulated Annealing and Rule Reduction
[J]. Computer Engineering and Applications, 2021, 57(16): 142-150.
|
[11] |
MENG Xiaojuan, ZHANG Yueqin, HAO Xiaoli, LYU Jinlai.
Multi-class Deep Convolutional Generative Adversarial Networks for Belt Tear Detection
[J]. Computer Engineering and Applications, 2021, 57(16): 269-275.
|
[12] |
DU Zhuoqun, HU Xiaoguang, YANG Shixin, LI Xiaoxiao, WANG Ziqiang, CAI Nengbin.
Overview of Pedestrian Re-identification Research Based on Multi-source Information
[J]. Computer Engineering and Applications, 2021, 57(14): 1-14.
|
[13] |
WANG Tengfei, CAI Manchun, YUE Ting, LU Tianliang.
Tor Anonymous Traffic Identification Based on Histogram-XGBoost
[J]. Computer Engineering and Applications, 2021, 57(14): 110-115.
|
[14] |
WANG Yifan, LU Huimin, GAO Ruoran, LI Yang.
Review:Region of Interest Extraction from Finger Vein Images
[J]. Computer Engineering and Applications, 2021, 57(13): 34-42.
|
[15] |
MI Yuan, TANG Hengliang.
Rumor Identification Research Based on Graph Convolutional Network
[J]. Computer Engineering and Applications, 2021, 57(13): 161-167.
|