[1] |
NI Xueli, LIANG Guangjun.
Recovery Method of WeChat Revoking Message Based on Dynamic Memory Analysis
[J]. Computer Engineering and Applications, 2021, 57(23): 146-153.
|
[2] |
CHEN Chenglong, QIU Zhicheng, DU Qiliang, TIAN Lianfang, LIN Bin, LI Miao.
Indoor Robot Global Relocation Method Based on Netvlad Neural Network
[J]. Computer Engineering and Applications, 2020, 56(9): 175-182.
|
[3] |
CHEN Zhe, WU Xiaojun.
Robust Face Recognition Algorithm Based on Structured Low-Rank Recovery
[J]. Computer Engineering and Applications, 2019, 55(6): 126-132.
|
[4] |
YANG-ZHAO Qilin, PENG Dingtao, TANG Qi, LUO Xiaomin.
Smoothing Quasi-Newton Algorithm for [lp] Regularization of Sparse Optimization
[J]. Computer Engineering and Applications, 2019, 55(22): 163-171.
|
[5] |
DONG Benzhi, YU Shangshu, JING Weipeng.
Salient Object Detection Algorithm via Multiple Prior Fusion
[J]. Computer Engineering and Applications, 2019, 55(2): 179-186.
|
[6] |
LIU Xia, LUO Wenhui, SU Yixin.
Application of Improved Sparse Representation Algorithm in Face Recognition
[J]. Computer Engineering and Applications, 2019, 55(14): 191-197.
|
[7] |
YU Hui1,2, PENG Guojun1,2, CAI Kaifeng1,2.
Research on File Recovery Method Against Ransomware Using Hybrid Pattern Cryptographic System
[J]. Computer Engineering and Applications, 2019, 55(10): 96-102.
|
[8] |
SUN Qiang, SHEN Yuzhi, LI Shijin.
Robust optimization and design for WEEE reverse logistics network under recovery uncertainty
[J]. Computer Engineering and Applications, 2017, 53(4): 263-270.
|
[9] |
ZHU Lingyun, LI Wensong, XIANG Nan.
Compressed sensing recovery algorithm of pacing ECG in noise environment
[J]. Computer Engineering and Applications, 2017, 53(18): 61-66.
|
[10] |
ZHANG Yakun, MENG Xiangru, CUI Wenyan, ZHAO Zhiyuan.
Recovery method for multi-link failures based on arc-disjiont colored trees
[J]. Computer Engineering and Applications, 2017, 53(14): 87-92.
|
[11] |
TAN Xiaodong1, RUAN Qunsheng2.
Internal P-sets and disguise of warning information-application
[J]. Computer Engineering and Applications, 2016, 52(9): 28-32.
|
[12] |
LV Weijie, CHEN Xia, LIU Hongzhen.
Image adaptive subspace pursuit algorithm based on compressive sensing
[J]. Computer Engineering and Applications, 2016, 52(3): 220-223.
|
[13] |
LU Weiwei1, LIU Jiefang3, HUO Yao1, YU Chen2, WANG Shitong3.
Study on electricity consumers payment channel preference based on fuzzy clustering
[J]. Computer Engineering and Applications, 2016, 52(19): 252-258.
|
[14] |
HU Yu1, XIE Kai1, RUAN Ningjun1, WU Peng2,3, HE Jianbiao4, LIU Conghao1.
Method of weak signal recovery based on 3D-curvelet transform
[J]. Computer Engineering and Applications, 2016, 52(18): 199-202.
|
[15] |
ZHENG Hongying, HE Jie, PENG Zhongxian, XIAO Di.
Reversible data hiding method in encrypted medical images
[J]. Computer Engineering and Applications, 2016, 52(12): 136-140.
|