[1] |
TANG Rui, JIAO Jiye, XU Huahao.
Design of Hardware Accelerator for Embedded Convolutional Neural Network
[J]. Computer Engineering and Applications, 2021, 57(4): 252-257.
|
[2] |
DU Yuzhang, PAN Jiahua, ZONG Rong, SU Wei, WANG Weilian.
Lightweight Network Heart Sound Classifier Based on Hardware Acceleration
[J]. Computer Engineering and Applications, 2021, 57(23): 263-269.
|
[3] |
JIANG Peihe, WANG Chenxu, GUO Gang, WEI Yinsheng.
Research on Hardware Trojan Detection for FPGA Application
[J]. Computer Engineering and Applications, 2021, 57(20): 119-124.
|
[4] |
ZHANG Haoyu, YING Jianfeng, SONG Chenyu, WANG Keke, YI Maoxiang.
Hardware Trojan Monitoring and Protection for Circuit Critical Path
[J]. Computer Engineering and Applications, 2020, 56(6): 73-78.
|
[5] |
GAO Shujing, WANG Chenglong, DONG Tingkun.
Optimized Adaboost Face Detection Based on ZYNQ
[J]. Computer Engineering and Applications, 2020, 56(6): 201-206.
|
[6] |
CHEN Xin, GAO Liangjun, REN Chuanbao, YI Maoxiang, HUANG Zhengfeng.
Hardware Trojan Detection Based on Transition Probability and RO Structure
[J]. Computer Engineering and Applications, 2020, 56(3): 49-54.
|
[7] |
LI Xiongwei1, WEI Yanhai1, WANG Xiaohan1, XU Lu2, SUN Ping3.
Improved Incremental SVDD Learning Algorithm for Hardware Trojan Detection
[J]. Computer Engineering and Applications, 2019, 55(9): 43-48.
|
[8] |
LUO Xiao, LIU Jingyang, WANG Jian, ZHANG Yufang, YI Hong.
Hardware and software design of high performance autonomous sailboat control system
[J]. Computer Engineering and Applications, 2018, 54(9): 265-270.
|
[9] |
SONG Lixin1, HE Yuping2.
Design of SUV rollover warning system based on hardware-in-the-loop real-time simulations
[J]. Computer Engineering and Applications, 2018, 54(3): 238-242.
|
[10] |
YANG Daming, HUANG Jiaoying, GAO Cheng.
Power analysis method of hardware Trojan detection considering process variation
[J]. Computer Engineering and Applications, 2018, 54(24): 1-5.
|
[11] |
HOU Qinglong, YANG Dong, GUO Shijie.
Review on energy consumption optimization methods of industrial robots
[J]. Computer Engineering and Applications, 2018, 54(22): 1-9.
|
[12] |
CHENG Zhao1,2, WANG Heming1, TANG Yongkang2, ZHANG Ying1.
Detail enhancement analysis based hardware Trojan detection using thermal maps
[J]. Computer Engineering and Applications, 2018, 54(16): 86-92.
|
[13] |
HUANG Jiaming, LI Guanguang, QIAO Yingliang, BAN Huatang, LIANG Rui.
Architecture and key technologies of converged infrastructure cloud server
[J]. Computer Engineering and Applications, 2018, 54(14): 65-70.
|
[14] |
WANG Yong1,2, SHANG Wenli2, ZHAO Jianming2, WAN Ming2, YUAN Weiwei1.
Design of embedded trusted computing platform based on TPM
[J]. Computer Engineering and Applications, 2018, 54(13): 105-110.
|
[15] |
WANG Xiaohan, LI Xiongwei, ZHANG Yang, XU Lu.
AES differential fault analysis based on hardware Trojan
[J]. Computer Engineering and Applications, 2017, 53(5): 103-106.
|