[1] |
WANG Jinyu, YANG Haitao, LI Gaoyuan, ZHANG Changgong, FENG Bodi.
Research Progress of Generative Adversarial Network and Its Application in Image Processing
[J]. Computer Engineering and Applications, 2021, 57(8): 26-35.
|
[2] |
WU Qing, ZENG Feng.
Research on Bertrand Game and Incentive Mechanism for Selfish Nodes in Opportunistic Networks
[J]. Computer Engineering and Applications, 2020, 56(13): 106-113.
|
[3] |
LI Yalong, CHEN Qin, ZHANG Min.
Research on Optimal Defense Strategy of Moving Targets Based on Game Theory
[J]. Computer Engineering and Applications, 2019, 55(19): 141-146.
|
[4] |
SU Jianmin, YANG Lanxin.
Super Resolution of Single Frame Remote Sensing Image Based on Generative Adversarial Nets
[J]. Computer Engineering and Applications, 2019, 55(12): 202-207.
|
[5] |
CHAI Huo1,2, HE Ruichun2, MA Changxi2, DAI Cunjie1,3.
Improved Frank-Wolfe algorithm for path traffic flows in traffic assignment problems
[J]. Computer Engineering and Applications, 2018, 54(9): 213-217.
|
[6] |
LIU Bingquan1, PAN Lijing1, DU Wei2.
Efficient algorithm for logit stochastic traffic equilibrium problem with dual constraints
[J]. Computer Engineering and Applications, 2018, 54(17): 221-224.
|
[7] |
ZHANG Wei1, SU Yang1,2, CHEN Wenwu1.
Game model with active defense based on signaling game
[J]. Computer Engineering and Applications, 2018, 54(17): 77-82.
|
[8] |
CHEN Yu1, FENG Xiang1,2, YU Huiqun1.
Research of improved imperialist competitive algorithm
[J]. Computer Engineering and Applications, 2018, 54(12): 206-213.
|
[9] |
WU Weimin, WU Wangyang, LIN Zhiyi, LI Zexiong, FANG Dianyu.
Dragonfly algorithm based on enhancing exchange of individuals’ information
[J]. Computer Engineering and Applications, 2017, 53(4): 10-14.
|
[10] |
WANG Lili1, CHEN Guobin1, ZHANG Guangquan2, 3.
Fair power control based on game theory in cognitive radio networks
[J]. Computer Engineering and Applications, 2017, 53(3): 144-148.
|
[11] |
SUN Chu, ZHAO Hui, WANG Xiaofei, WEI Zhenglei.
Application of interval numbers decision to UCAV attack-defends game theory
[J]. Computer Engineering and Applications, 2017, 53(15): 170-175.
|
[12] |
WU Bin, MA Jitao, WU Ping.
Expert random selection algorithm based on information entropy
[J]. Computer Engineering and Applications, 2016, 52(5): 119-121.
|
[13] |
XUE Chunrong.
Global stability of SEIR epidemic model with disease in predator
[J]. Computer Engineering and Applications, 2015, 51(23): 74-77.
|
[14] |
ZHENG Zongjian.
Hopf bifurcation analysis of Holling III-Leslie type predator-prey system with two delays
[J]. Computer Engineering and Applications, 2015, 51(21): 48-51.
|
[15] |
ZHENG Yunshui, MU Ran, LIN Junting, CHENG Ligang.
Research of dynamic multi-stage scheduling decision model and algorithm for railway emergency resources
[J]. Computer Engineering and Applications, 2015, 51(20): 213-219.
|