[1] |
JIANG Peihe, WANG Chenxu, GUO Gang, WEI Yinsheng.
Research on Hardware Trojan Detection for FPGA Application
[J]. Computer Engineering and Applications, 2021, 57(20): 119-124.
|
[2] |
YU Juan,LUO Shun.
Detection Method of Illegal Building Based on YOLOv5
[J]. Computer Engineering and Applications, 2021, 57(20): 236-244.
|
[3] |
ZHANG Wu, ZHOU Xingyu, ZOU Junhua, PAN Zhisong, DUAN Yexin, CHEN Jun.
Adversarial Attack Algorithm Based on Erosion Batch Normalization
[J]. Computer Engineering and Applications, 2021, 57(16): 116-124.
|
[4] |
YANG Xinmin, DONG Hongbin, TAN Chengyu, ZHOU Wen.
Dendritic Cell Model Using Singular Value Decomposition and Information Gain
[J]. Computer Engineering and Applications, 2021, 57(15): 156-162.
|
[5] |
BAI Bo, XIE Gang, XU Xinying.
Research on Taillight Detection Algorithm for Multi-Scale Cascade R-FCN
[J]. Computer Engineering and Applications, 2020, 56(6): 194-200.
|
[6] |
ZHANG Man, XIA Zhanguo, LIU Bing, ZHOU Yong.
Character Level Text Classification Based on Fully Convolutional Neural Network
[J]. Computer Engineering and Applications, 2020, 56(5): 166-172.
|
[7] |
GUO Mingang, GONG He.
Research on AlexNet Improvement and Optimization Method
[J]. Computer Engineering and Applications, 2020, 56(20): 124-131.
|
[8] |
LI Ximing, WU Jiarun, WU Shaoqian, GUO Yubin, MA Sha.
Key Resilient Encryption Algorithm Based on Generative Adversarial Networks
[J]. Computer Engineering and Applications, 2020, 56(10): 69-74.
|
[9] |
HAN Bin, YANG Dali.
Normalization of Printed Images Based on Transmission Transformation
[J]. Computer Engineering and Applications, 2019, 55(23): 188-193.
|
[10] |
LI Min, ZHANG Guohao, ZENG Jianwei, YANG Xiaofeng, HU Xiaomin.
Inception Model of Deep Convolutional Neural Network for Image Denoising
[J]. Computer Engineering and Applications, 2019, 55(20): 139-144.
|
[11] |
CAO Hao, CHEN Lili, SI Jibing, REN Junlan.
Singular Value Decomposition and Sparse Automatic Encoder for Bearing Fault Diagnosis
[J]. Computer Engineering and Applications, 2019, 55(20): 257-262.
|
[12] |
WANG Yanzhe, ZHANG Limin, ZHANG Bingqiang, LI Zhenyu.
End-to-End Mandarin Speech Recognition with Improved Convolution Input
[J]. Computer Engineering and Applications, 2019, 55(17): 143-149.
|
[13] |
LIANG Xinyu1,2, WU Jiande1,2, HUANG Guoyong1,2, SUN Lei1,2.
H∞ robust adaptive CKF algorithm used in GNSS/INS integrated navigation
[J]. Computer Engineering and Applications, 2018, 54(9): 251-256.
|
[14] |
LI Tianxue, WANG Jianping, ZHANG Minqing, KONG Yongjun.
High fidelity reversible data hiding algorithm based on SVD compression
[J]. Computer Engineering and Applications, 2018, 54(14): 115-119.
|
[15] |
ZHENG Xiongfeng, DING Lixin, WAN Runze.
User and product Attention mechanism based hierarchical BGRU model
[J]. Computer Engineering and Applications, 2018, 54(11): 145-152.
|