[1] |
HUANG Yilei, XIA Zhijie, WANG Yiming.
Research on False Information Dissemination Model of Strong-Ties Social Media
[J]. Computer Engineering and Applications, 2021, 57(9): 126-133.
|
[2] |
MEN Jiawei, LAI Chengzhe.
Trust Management Scheme with Incentive Mechanism for Cooperative Download of Internet of Vehicles
[J]. Computer Engineering and Applications, 2021, 57(5): 100-106.
|
[3] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[4] |
LI Tianming, YAN Xiang, ZHANG Zengnian, TIAN Yang, WU Xin, LI Chaoqun.
Application Research of Blockchain + Internet of Things in Agricultural Product Traceability
[J]. Computer Engineering and Applications, 2021, 57(23): 50-60.
|
[5] |
ZHAO Jing, WANG Ruwu, ZHOU Hao.
Simulation Research of MQTT Protocol Based on NS-3
[J]. Computer Engineering and Applications, 2021, 57(23): 137-145.
|
[6] |
WANG Xiaoguang, YANG Peibei.
Design and Effect Analysis of Digital Transformation of Shipping Logistics Enterprises
[J]. Computer Engineering and Applications, 2021, 57(21): 241-247.
|
[7] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[8] |
YANG Shu, SU Fang.
Distributed Data Security Integrated Application System Based on Microservices
[J]. Computer Engineering and Applications, 2021, 57(18): 238-247.
|
[9] |
LI Jian, ZHANG Dawei, JIANG Xiaoming, XIANG Liyun.
Review on Parallelized Flood Inundation Models
[J]. Computer Engineering and Applications, 2021, 57(13): 1-7.
|
[10] |
WANG Qi, MIN Huasong.
Review of Coordinated Control Algorithms for Dual-Arm Robots
[J]. Computer Engineering and Applications, 2021, 57(1): 1-16.
|
[11] |
ZHANG Wuyi, LI Jianguo, GONG Yuwen.
Safety Awareness Evolution Model of High-Altitude Parabolic and Falling Objects Prevention
[J]. Computer Engineering and Applications, 2021, 57(1): 254-260.
|
[12] |
CHEN Guang, JIANG Tonghai, WANG Meng, TANG Xinyu, JI Wenfei.
Custom SWRL Knowledge Graph Completion Reasoning Built-ins Implementation Method
[J]. Computer Engineering and Applications, 2021, 57(1): 261-270.
|
[13] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[14] |
WU Chunmei, HU Junhao, YIN Jianghua.
Using Improved Generative Adversarial Network for Human Pose Estimation
[J]. Computer Engineering and Applications, 2020, 56(8): 96-103.
|
[15] |
WANG Yunmin, LI Hui, WANG Han, BAI Yongjie, NING Chonghui.
Research on Identifier Data Management Strategy of Industrial Internet Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(7): 1-7.
|