[1] |
LI Duo, DONG Chaoqun, SI Pinchao, HE Man, LIU Qianchao.
Survey of Research on Neural Network Verification and Testing Technology
[J]. Computer Engineering and Applications, 2021, 57(22): 53-67.
|
[2] |
WEI Danni, YANG Youlong, QIU Haiquan.
Self-Training Algorithm Combining Density Peak and Cut Edge Weight
[J]. Computer Engineering and Applications, 2021, 57(2): 70-76.
|
[3] |
ZUO Kuo, LI Ning, TIAN Ying’ai, HOU Xia.
Automatic Testing Method for Typesetting Effect of Reflowable Document
[J]. Computer Engineering and Applications, 2021, 57(2): 273-278.
|
[4] |
WU Xudong, TANG Qi, ZHANG Wei, ZHANG Jian, WEI Jibo, WANG Yijun.
Research on SCA Compliance Testing Method Based on Extended Finite State Machine
[J]. Computer Engineering and Applications, 2021, 57(16): 263-268.
|
[5] |
TAN Lijuan, ZHENG Wei, LIU Youlin, FAN Xin, YANG Fengyu.
Survey of Airborne Software Test and Verification Methods for Airworthiness Standards
[J]. Computer Engineering and Applications, 2021, 57(15): 9-22.
|
[6] |
LIU Youlin, ZHENG Wei, TAN Lijuan, FAN Xin, YANG Fengyu.
Summary of Airborne Software Testing and Verification Tools for Airworthiness Standards
[J]. Computer Engineering and Applications, 2021, 57(11): 1-10.
|
[7] |
TANG Weijun, XU Kun, LIU Youquan, XIA Xuan.
Method for Generating Three-Dimensional Point Cloud of Trees in Autonomous Vehicle Virtual Testing
[J]. Computer Engineering and Applications, 2021, 57(11): 185-192.
|
[8] |
MA Yuandong, LUO Zijiang, NI Zhaofeng, XU Bin, WU Fengjiao, SUN Shouyu, YANG Xiuzhang.
Multi-target Detection Based on Improved SSD Algorithm
[J]. Computer Engineering and Applications, 2020, 56(23): 23-30.
|
[9] |
LIU Jialuo, YAO Yi, HUANG Song, HUI Zhanwei, CHEN Qiang, KOU Dalei, ZHANG Zhongwei.
Metamorphic Testing Framework for Machine Learning Image Classification Program
[J]. Computer Engineering and Applications, 2020, 56(17): 69-77.
|
[10] |
WEI Qingjie1, LIU Shukun2.
Method of Cross-Browser Compatibilities Testing for Web Application
[J]. Computer Engineering and Applications, 2019, 55(5): 55-59.
|
[11] |
MA Junyan, ZHANG Ying, LI Yi, WANG Jin, ZHANG Te.
HA2:Hierarchical Anomaly Analysis Technology for IoT Sensing Device Firmware
[J]. Computer Engineering and Applications, 2019, 55(22): 60-68.
|
[12] |
YAO Yiwen, JIANG Shujuan, BO Lili.
Survey of Mutation-Based Fault Location
[J]. Computer Engineering and Applications, 2019, 55(20): 1-12.
|
[13] |
LI Xiaowen, LI Yangyang, LEI Xiu.
Research and Implementation of Authentication and Key Agreement Process in 5G Client
[J]. Computer Engineering and Applications, 2019, 55(11): 35-39.
|
[14] |
ZHU Shuqin, WANG Wenhong, LI Junqing.
Designing a class of quadratic polynomial chaotic maps and their pseudo random number generator
[J]. Computer Engineering and Applications, 2018, 54(9): 84-88.
|
[15] |
ZHU Yi1,2, HUANG Zhiqiu1, ZHOU Hang1, LIU Linyuan1,3.
Meta-modeling method for implementing template meta-programming of functional programming
[J]. Computer Engineering and Applications, 2018, 54(7): 1-10.
|