[1] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[2] |
ZHANG Shiqi, WEI Feifei, FAN Xinyue.
Model of Secure Routes Selection Influenced by Weather and Traffic Accidents
[J]. Computer Engineering and Applications, 2021, 57(10): 246-251.
|
[3] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[4] |
GUI Zhiming, LI Zhuangzhuang, GUO Limin.
Short-Term Traffic Flow Prediction Based on ACGRU Model
[J]. Computer Engineering and Applications, 2020, 56(21): 260-265.
|
[5] |
LI Tongwei, WANG Qingrong.
Prediction Research on Road Network Traffic Flow in Background of Time and Space Analysis
[J]. Computer Engineering and Applications, 2020, 56(17): 258-265.
|
[6] |
WANG Yu, GUO Lanying, CHENG Xin.
Short-Term Traffic Flow Prediction Optimization Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(16): 211-217.
|
[7] |
YUAN Yaoyao, KANG Yan, LI Hao, NIU Ruicheng, LIANG Wentao, LI Jinyuan.
Timing Traffic Flow Data Completion Based on ST-DCGAN
[J]. Computer Engineering and Applications, 2020, 56(15): 140-146.
|
[8] |
JIA Zhichun, LU Yuan, LI Xiang, XING Xing.
Multi-Parameter Web Services Selection Method
[J]. Computer Engineering and Applications, 2019, 55(21): 74-78.
|
[9] |
DENG Xuankun1,2, WAN Liang1,2, DING Hongwei1,2, XIN Zhuang1,2.
Traffic Flow Prediction Based on Deep Neural Networks
[J]. Computer Engineering and Applications, 2019, 55(2): 228-235.
|
[10] |
HE Hong, CHEN Yong.
HE Hong, CHEN Yong
[J]. Computer Engineering and Applications, 2019, 55(14): 209-214.
|
[11] |
CHAI Huo1,2, HE Ruichun2, MA Changxi2, DAI Cunjie1,3.
Improved Frank-Wolfe algorithm for path traffic flows in traffic assignment problems
[J]. Computer Engineering and Applications, 2018, 54(9): 213-217.
|
[12] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[13] |
ZHOU Hao1, WANG Jingkang1, WANG Bo2, LUO Yutao1, MA Zewen1, LIU Gongshen1.
Comprehensive overview of plaintext password generation models
[J]. Computer Engineering and Applications, 2018, 54(4): 9-16.
|
[14] |
LUO Yile, LIANG Yanping, WANG Yan.
Traffic flow parameter estimation from satellite video data based on optical flow
[J]. Computer Engineering and Applications, 2018, 54(10): 204-207.
|
[15] |
PAN Li1,2, DENG Jia1, WANG Yongli1.
HMM-Cluster: Trajectory clustering for discovering traffic volume overload
[J]. Computer Engineering and Applications, 2018, 54(1): 77-85.
|