[1] |
XU Yinxiang, CHEN Qidong, SUN Jun.
Text Adversarial Attack Method Applying Based on Improved Quantum Behaved Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2022, 58(9): 175-180.
|
[2] |
GAO Guangshang.
Survey on Attention Mechanisms in Deep Learning Recommendation Models
[J]. Computer Engineering and Applications, 2022, 58(9): 9-18.
|
[3] |
WEI Tingting, YUAN Weilin, LUO Junren, ZHANG Wanpeng.
Survey of Opponent Modeling Methods and Applications in Intelligent Game Confrontation
[J]. Computer Engineering and Applications, 2022, 58(9): 19-29.
|
[4] |
TANG Hong, LIU Shuang, JIU Yinghao, HE Yumeng, ZHU Shan.
Improved Study of Practical Byzantine Fault-Tolerant Algorithm
[J]. Computer Engineering and Applications, 2022, 58(9): 144-150.
|
[5] |
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling.
Survey of IoT Forensics
[J]. Computer Engineering and Applications, 2022, 58(8): 12-32.
|
[6] |
SHI Jie, YUAN Chenxiang, DING Fei, KONG Weixiang.
Survey of Building Target Detection in SAR Images
[J]. Computer Engineering and Applications, 2022, 58(8): 58-66.
|
[7] |
CHEN Bowen, ZOU Hai.
Self-Conclusion and Self-Adaptive Variation Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2022, 58(8): 67-75.
|
[8] |
XU Jian, CHEN Pinghua, XIONG Jianbin.
Memory-Related Vulnerability Detection Method Based on Abstract Memory Model
[J]. Computer Engineering and Applications, 2022, 58(8): 96-108.
|
[9] |
ZHAO Jiang, MENG Chenyang, WANG Xiaobo, HAO Chongqing, LI Ran, LIU Huixian, WANG Zhaolei.
Modeling and Analysis of AGV Grid Method Based on Feature Points Extraction
[J]. Computer Engineering and Applications, 2022, 58(8): 156-167.
|
[10] |
XIAO Jinzhuang, LI Ruipeng, JI Mengmeng.
Speaker Verification Based on Teacher-Free Knowledge Distillation Model
[J]. Computer Engineering and Applications, 2022, 58(8): 198-203.
|
[11] |
YANG Xi, YAN Jie, WANG Wen, LI Shaoyi, LIN Jian.
Research and Prospect of Brain-Inspired Model for Visual Object Recognition
[J]. Computer Engineering and Applications, 2022, 58(7): 1-20.
|
[12] |
LI Qingliang, ZHANG Zhi’an, MA Haonan, ZHOU Hemiao.
Gait Optimization of Anti-Gravity Shift of Quadruped Robot
[J]. Computer Engineering and Applications, 2022, 58(7): 303-310.
|
[13] |
MENG Yuyu, WANG Xiao, YAN Guanghui, LUO Hao, YANG Bo, ZHANG Lei, WANG Qiong.
Ranking Algorithms of Vital Nodes Based on Spring Model
[J]. Computer Engineering and Applications, 2022, 58(7): 77-86.
|
[14] |
ZHANG Hao, ZHANG Xiaoyu, ZHANG Zhenyou, LI Wei.
Summary of Intrusion Detection Models Based on Deep Learning
[J]. Computer Engineering and Applications, 2022, 58(6): 17-28.
|
[15] |
ZHANG Ming, LU Qinghua, HUANG Yuanzhong, LI Ruixuan.
Recent Advances and Challenges on Grammatical Error Correction in Natural Language
[J]. Computer Engineering and Applications, 2022, 58(6): 29-41.
|