[1] |
DING Zhihui, QIAO Gangzhu, CHENG Tan, SU Rong.
Shapelets Transform Method Based on LSH
[J]. Computer Engineering and Applications, 2021, 57(3): 112-119.
|
[2] |
CHEN Xiaohan, WEI Shuning, QIN Zhengze.
Malware Family Classification Based on Deep Learning Visualization
[J]. Computer Engineering and Applications, 2021, 57(22): 131-138.
|
[3] |
RAO Jiawang, MA Ronghua.
Improved Kernel Density Estimator Based Spatial Point Density Algorithm
[J]. Computer Engineering and Applications, 2021, 57(11): 260-265.
|
[4] |
YING Wenjie, SANG Jitao.
Improved Hashing for Efficient Recommendation Method
[J]. Computer Engineering and Applications, 2020, 56(9): 75-83.
|
[5] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[6] |
XIONG Lin, TANG Wanmei.
Incremental Learning Algorithm Based on Heterogeneous Classifier Ensemble
[J]. Computer Engineering and Applications, 2020, 56(7): 155-161.
|
[7] |
GAO Shujing, WANG Chenglong, DONG Tingkun.
Optimized Adaboost Face Detection Based on ZYNQ
[J]. Computer Engineering and Applications, 2020, 56(6): 201-206.
|
[8] |
WANG Zhen, SUN Fuzhen, ZHANG Longbo, WANG Lei.
Ambiguous Ranking Perceptual Hashing
[J]. Computer Engineering and Applications, 2020, 56(21): 123-130.
|
[9] |
GAO Lianxin,WEI Wei, HU Yongzhi, FENG Yuhao.
Video Early Smoke Detection Based on Motion Extraction and 3D Convolutional Neural Network
[J]. Computer Engineering and Applications, 2020, 56(17): 266-272.
|
[10] |
HUANG Xuebo, XU Zhengguo, YAN Jikun.
High-Frequency Similar Sequence Extraction Algorithm of Protocol Data Based on Simhash
[J]. Computer Engineering and Applications, 2020, 56(16): 199-203.
|
[11] |
DUAN Yu, CAO Longhan, ZHANG Zhizhong, GAO Shanglei.
Research and Implementation of Signaling Analysis Technology in 5G Terminal Simulator
[J]. Computer Engineering and Applications, 2020, 56(15): 106-112.
|
[12] |
ZHANG Hang, SHENG Zhiwei, ZHANG Shibin, YANG Min.
Application of Simhash Algorithm in Text Deduplication
[J]. Computer Engineering and Applications, 2020, 56(11): 246-251.
|
[13] |
ZHANG Guipeng, KUANG Zhenxi, CHEN Pinghua.
Cloud Storage Deduplication Scheme Using Signature and Hash Technology
[J]. Computer Engineering and Applications, 2020, 56(1): 76-82.
|
[14] |
WANG Miao, JING Junfeng.
Image Retrieval Based on Hash Coding and Convolutional Neural Network
[J]. Computer Engineering and Applications, 2019, 55(23): 194-199.
|
[15] |
ZHANG Hua, CAO Lin.
Face Sketch Synthesis Method Combining pHash and Sparse Coding
[J]. Computer Engineering and Applications, 2019, 55(22): 187-194.
|