[1] |
WU Wenjie, SONG Wen’ai, GAO Xuemei, YANG Jijiang, WANG Qing, HUANG Liping, LEI Yi.
Review of X-Ray-Based Computer-Aided Diagnosis of Adult OSA
[J]. Computer Engineering and Applications, 2021, 57(9): 1-8.
|
[2] |
WANG Xiao, TANG Lun, HE Xiaoyu, CHEN Qianbin.
Multi-dimensional Resource Optimization of Service Function Chain Based on Deep Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 68-76.
|
[3] |
CHANG Yawen, ZHAO Dongqing, SHAN Yanhu.
Research on Stereo Matching Algorithm Based on Multi-feature Fusion and Adaptive Aggregation
[J]. Computer Engineering and Applications, 2021, 57(23): 219-225.
|
[4] |
WU Xudong, TANG Qi, ZHANG Wei, ZHANG Jian, WEI Jibo, WANG Yijun.
Research on SCA Compliance Testing Method Based on Extended Finite State Machine
[J]. Computer Engineering and Applications, 2021, 57(16): 263-268.
|
[5] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[6] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[7] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[8] |
ZENG Shulei, LI Xuehua, PAN Chunyu, WANG Yafei, ZHAO Zhongyuan.
Resource Allocation Framework Based on Deep Neural Network in Fog Radio Access Network
[J]. Computer Engineering and Applications, 2020, 56(24): 78-84.
|
[9] |
HE Weijian, LU Jiangcheng, ZHU Yaolin, LI Xuecong.
Elliptical Model Indoor Positioning Algorithm for RFID Rotating Antenna
[J]. Computer Engineering and Applications, 2019, 55(9): 87-93.
|
[10] |
ZHAN Shanhua1,2.
Secure Bidirectional Authentication Protocol for RFID
[J]. Computer Engineering and Applications, 2019, 55(5): 83-88.
|
[11] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[12] |
WANG Yulei1,2, QIU Gang3.
Artificial Physics Multi-Objective Algorithm for Spectrum Detection of Cognitive Internet of Things
[J]. Computer Engineering and Applications, 2019, 55(14): 83-86.
|
[13] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[14] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[15] |
WANG Yangxiong, ZHANG Xiangwen.
Design and implementation of vehicle-mounted module of BMS for battery electric vehicles based on MK60DN512ZVLQ10
[J]. Computer Engineering and Applications, 2018, 54(7): 232-238.
|