[1] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[2] |
LIAO Liefa, YANG Hong.
Review of Beetle Antennae Search
[J]. Computer Engineering and Applications, 2021, 57(12): 54-64.
|
[3] |
ZHU Shuqin, LIU Rongyue, ZHOU Ranran, WANG Wenhong.
New Image Encryption Algorithm Based on Key Dynamic Selection Mechanism
[J]. Computer Engineering and Applications, 2019, 55(9): 56-64.
|
[4] |
WANG Yong, FANG Xiaoqiang, WANG Ying.
Hyperchaos System and AES Combined with Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(8): 164-170.
|
[5] |
FENG Jianxin1,2, LI Hui1,2, LIU Zhiguo1,2.
New Flame Color Space—IFCS
[J]. Computer Engineering and Applications, 2019, 55(5): 203-210.
|
[6] |
HUANG Yuda1, WANG Yiran2, NIU Sijie3.
Analysis and Optimization of GSO Algorithm Based on Chaos and Self-Adaptive Search Strategy
[J]. Computer Engineering and Applications, 2019, 55(3): 147-153.
|
[7] |
CHEN Jie, ZHANG Wendong, SU Linlin, SANG Shengbo.
Spacecraft Attitude-Orbit Control Algorithm Based on Lyapunov Stability Criterion and CPSO Algorithm
[J]. Computer Engineering and Applications, 2019, 55(24): 229-234.
|
[8] |
WANG Yong, YANG Jin, WANG Ying.
Image Encryption Algorithm Based on Improved Henon Hyperchaotic System Combined with AES Algorithm
[J]. Computer Engineering and Applications, 2019, 55(22): 180-186.
|
[9] |
XIE Guobo, WU Zhenyu.
Chaotic Image Encryption Algorithm Based on Wavelet Transform and Gravity Model
[J]. Computer Engineering and Applications, 2019, 55(13): 100-105.
|
[10] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[11] |
ZHU Shuqin1, WANG Wenhong1, SUN Zhonggui2.
Security Analysis and Improvement of Chaotic Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 115-122.
|
[12] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[13] |
LI Longshu1,2, ZHANG Xiaojian2.
New chaos particle swarm optimization based on adaptive inertia weight
[J]. Computer Engineering and Applications, 2018, 54(9): 139-144.
|
[14] |
XIE Goubo, ZHU Runying.
Image encryption algorithm based on compound cascade chaotic
[J]. Computer Engineering and Applications, 2018, 54(8): 189-194.
|
[15] |
SHI Fei, ZHANG Hongmei, ZHANG Xiangli.
Image encryption algorithm based on chaotic map and DNA coding
[J]. Computer Engineering and Applications, 2018, 54(5): 91-95.
|