[1] |
LE Deguang, ZHAO Jie, GONG Shengrong.
ARM Assembly Code Obfuscation Algorithm Based on Mode Switch
[J]. Computer Engineering and Applications, 2021, 57(18): 122-129.
|
[2] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[3] |
WANG Xin, GAO Yan, CHEN Yi, QIU Jingjun.
Combat Team’s Hierarchical Behavior Modeling
[J]. Computer Engineering and Applications, 2020, 56(12): 250-255.
|
[4] |
GAO Ang, DUAN Li, ZHANG Guohui, DONG Zhiming, CAO Jie, GUO Qisheng.
Development Status of Computer Generated Force Behavior Modeling
[J]. Computer Engineering and Applications, 2019, 55(19): 43-51.
|
[5] |
HE Xueming1,2, HE Junfei2, KONG Lijuan2, WU Meiping1,2, ZHANG Rong3, JI Xiaogang2.
Measurement and real-time reconstruction of freeform surface based on closed-loop theory
[J]. Computer Engineering and Applications, 2016, 52(6): 258-263.
|
[6] |
WU Yaofeng1, WANG Wen2, LU Keqing2, WEI Yanding1, CHEN Zichen1.
Semantics-based measurement information transmission method for reverse engineering
[J]. Computer Engineering and Applications, 2015, 51(20): 140-144.
|
[7] |
XU Yebing, LIU Chao.
Research on retrieval methods for traceability between Chinese documentation and source code based on LDA
[J]. Computer Engineering and Applications, 2013, 49(5): 70-76.
|
[8] |
ZHANG Wei1,ZENG Li2,TAN Zhongqiang1.
Research on boundary error reduction of triangle mesh reconstruction for unorganized point cloud
[J]. Computer Engineering and Applications, 2011, 47(35): 196-198.
|
[9] |
YANG Zhimou,SI Guangya,LI Zhiqiang.
Conceptual model study on social crowd behavior modeling
[J]. Computer Engineering and Applications, 2011, 47(21): 231-234.
|
[10] |
TIAN Yuan,LI Jianbin,ZHANG Zhen.
Effective approach to re-engineering of protocol’s state machine model
[J]. Computer Engineering and Applications, 2011, 47(19): 63-67.
|
[11] |
ZHANG Long-jie,XIE Xiao-fang,YUAN Sheng-zhi.
Research on recognition and rebuilding of logic compound sentences in decompilation
[J]. Computer Engineering and Applications, 2010, 46(13): 40-43.
|
[12] |
YE Xiao-guo,XIAO Fu,SUN Li-juan,WANG Ru-chuan.
Research and performance analysis on SCPS/CCSDS protocol suite
[J]. Computer Engineering and Applications, 2009, 45(4): 34-37.
|
[13] |
MA Yuan-kui,ZHANG Shu-sheng,BAI Xiao-liang,FAN Hai-tao.
Torus recognition based on shape distributions
[J]. Computer Engineering and Applications, 2009, 45(34): 10-12.
|
[14] |
TANG Hong-jiang,MA Shu-mei,LI Ai-ping.
Error analysis and inspection in integrated reverse engineering
[J]. Computer Engineering and Applications, 2008, 44(25): 72-74.
|
[15] |
LIU Xue-mei1,2,ZHUANG Jin-lin2,ZHANG Shu-sheng1,LI Bing-sheng2.
Segmentation of point cloud based on Adaptive Fuzzy c-Elliptotype clustering
[J]. Computer Engineering and Applications, 2007, 43(15): 33-34.
|