[1] |
ZHU Jiaying, GAO Maoting.
AUV Path Planning Based on Particle Swarm Optimization and Improved Ant Colony Optimization
[J]. Computer Engineering and Applications, 2021, 57(6): 267-273.
|
[2] |
WANG Peng, YE Xueyi, WANG Tao, QIAN Dingwei.
Face Recognition Based on Double Variation and Double Space Local Directional Pattern
[J]. Computer Engineering and Applications, 2021, 57(4): 91-99.
|
[3] |
JIANG Kui, QIU Yuandong, ZHENG Haocheng.
ICMPv6 DDoS Attack Detection Method Based on Information Entropy and LSTM
[J]. Computer Engineering and Applications, 2021, 57(21): 148-154.
|
[4] |
FENG Lei, JIANG Lei, XU Hua, GOU Zezhong.
Triplet Siamese Network Modulation Recognition Algorithm Based on Network Measurement
[J]. Computer Engineering and Applications, 2021, 57(19): 135-141.
|
[5] |
SONG Shijie, CHEN Kaiyan, ZHANG Yang.
Security Evaluation Framework of Deep Learning Side Channel Analysis from Information Entropy
[J]. Computer Engineering and Applications, 2021, 57(17): 138-146.
|
[6] |
ZHANG Nianpeng, WU Xu, ZHU Qiang.
Entropy-Based Oversampling Framework
[J]. Computer Engineering and Applications, 2021, 57(13): 96-101.
|
[7] |
LI Yuxin, LI Yueyue.
Multi-objective Vehicle Scheduling Problem for JIT Procurement
[J]. Computer Engineering and Applications, 2021, 57(12): 263-272.
|
[8] |
XU Jingzhong, MA Lina.
Automatic Boundary Extraction from Building Point Clouds Based on Virtual Grids
[J]. Computer Engineering and Applications, 2021, 57(10): 181-186.
|
[9] |
CHEN Jiancu, WANG Yue, ZHU Xiaofei, LI Zhangyu, LIN Zhihang.
Wild Animal Video Object Detection Method Combining Multi-feature Map
[J]. Computer Engineering and Applications, 2020, 56(7): 221-227.
|
[10] |
LIN Kezheng, ZHANG Yuanming, LI Haotian.
Research on HOG Feature Extraction Algorithm Weighted by Information Entropy
[J]. Computer Engineering and Applications, 2020, 56(6): 147-152.
|
[11] |
BAI Fengbo, CHANG Lin, WANG Shifan, LI Bin, WANG Yingjie, ZHOU Hong, LIU Yao.
Improved Method Study on Extracting Keywords in Chinese Judgment Documents
[J]. Computer Engineering and Applications, 2020, 56(23): 153-160.
|
[12] |
ZHOU Ruimin, LI Hui.
Path Planning of Mobile Robot Based on Improved Dynamic Programming Algorithm
[J]. Computer Engineering and Applications, 2020, 56(21): 20-24.
|
[13] |
LI Mengte, GU Chunhua, WEN Mi.
Secure Charging Transaction Data Storage Platform Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(21): 79-84.
|
[14] |
XU Jiazhen, LI Ting, YANG Wei.
Person Re-Identification by Multi-Scale Local Feature Selection
[J]. Computer Engineering and Applications, 2020, 56(2): 141-145.
|
[15] |
LIU Wenfen, MU Xiaodong, HUANG Yuehua.
Anomaly Detection Method Based on Multi-resolution Grid
[J]. Computer Engineering and Applications, 2020, 56(17): 78-85.
|