[1] |
ZHAI Zhengli, LI Penghui, FENG Shu.
Research Overview of Adversarial Attacks on Graphs
[J]. Computer Engineering and Applications, 2021, 57(7): 14-21.
|
[2] |
SUN Shuang, CHEN Yan, PIAO Zaiji, ZHANG Jinsong.
Survey of Spatiotemporal Pattern Mining and Management Decision of Trajectory Data
[J]. Computer Engineering and Applications, 2021, 57(16): 16-26.
|
[3] |
PENG Xiaohong, LIANG Zixiang, ZHANG Jun, CHEN Rongfa.
Review of Underwater Image Preprocessing Based on Deep Learning
[J]. Computer Engineering and Applications, 2021, 57(13): 43-54.
|
[4] |
LI Chao, DONG Xinhua, CHEN Jianxia.
Asynchronous Iterative Updates Method Based on Subgraph in Spark
[J]. Computer Engineering and Applications, 2020, 56(7): 67-73.
|
[5] |
LI Daoquan, WANG Xue, YU Bo, HUANG Taiming.
Network Traffic Classification Method Based on One-Dimensional Convolution Neural Network
[J]. Computer Engineering and Applications, 2020, 56(3): 94-99.
|
[6] |
ZHANG Xiao, SUN Yiming, WU Xufeng.
Research on Query-Aware Relation-Graph Database Adaptive Storage Technology
[J]. Computer Engineering and Applications, 2020, 56(17): 100-108.
|
[7] |
LIU Juntao, WANG Sujuan, LIN Xiaoming, LIU Zuoshi, TAN Jianhui, SONG Dan.
Exudates Detection in Fundus Image Based on Fuzzy C-Means Clustering and Edge-Aware Model
[J]. Computer Engineering and Applications, 2020, 56(11): 192-199.
|
[8] |
CHAO Jingjing, SHEN Wenzhong, SONG Tianshu.
Eye Location Algorithm of Binocular Iris Image Based on HOG and Cascade SVM
[J]. Computer Engineering and Applications, 2019, 55(9): 184-189.
|
[9] |
LIN Ding1, 2, XU Ying1, 2, HUANG Guoxin1, 2, CHEN Chongcheng1, 2.
Visualizing graph data in 3D tree-style based on Louvain algorithm
[J]. Computer Engineering and Applications, 2018, 54(7): 96-101.
|
[10] |
ZHOU Cuilian, YOU Jinguo, ZHANG Ting, JIAN Xingming.
S-Clique:Attribute constrained maximal clique enumeration
[J]. Computer Engineering and Applications, 2018, 54(5): 66-71.
|
[11] |
WANG Qingyun1,2, LI Hongyan1,2, HONG Shenda1,2.
Multi factors influencing degree analysis method based on tensor model
[J]. Computer Engineering and Applications, 2017, 53(17): 94-100.
|
[12] |
WANG Jinsheng1, XIONG Bangshu1, MO Yan1, HUANG Jianping2, LI Xinmin2, ZHAO Pingjun3.
Recognition method of helicopter flight condition based on random forest
[J]. Computer Engineering and Applications, 2017, 53(17): 149-152.
|
[13] |
CHEN Di, DAI Yanjun, WANG Zhifeng.
Survey of research on forum topic mining
[J]. Computer Engineering and Applications, 2017, 53(16): 36-44.
|
[14] |
DING Qianglong, WANG Jin, ZHANG Xuejie.
Research on ETL method of transforming relational data to graph data based on sub-schema
[J]. Computer Engineering and Applications, 2017, 53(12): 76-84.
|
[15] |
YANG Li1, WU Guifang1, SUN Xiuming2.
Algorithm of pavement crack fusion based on multi-scale curvelet transforms
[J]. Computer Engineering and Applications, 2016, 52(6): 182-185.
|