[1] |
Changhong YU, Ya LU, Haixin WANG, Ming GAO.
Traffic Classification Algorithm for IoT Device Based on Sliding Time Window
[J]. Computer Engineering, 2023, 49(7): 259-268.
|
[2] |
SU Ruiguo, YANG Jian, QIN Jiwei, WU Xiaoxiong, JIA Zhenhong.
Research on Lightweight Consensus Algorithm Based on IoT Blockchain
[J]. Computer Engineering, 2023, 49(2): 175-180.
|
[3] |
LIU Peng, LIU Jie, JIA Xun.
Research and Implementation of an Embedded Hardware-Assisted Debugging Mechanism
[J]. Computer Engineering, 2022, 48(9): 139-145.
|
[4] |
DING Qingfeng, LI Jinguo.
A Distributed Abnormal Traffic Detection Scheme in Internet of Things Environment
[J]. Computer Engineering, 2022, 48(8): 152-159.
|
[5] |
HUANG Huawei, KONG Wei, PENG Xiaowen, ZHENG Zibin.
Survey on Blockchain Sharding Technology
[J]. Computer Engineering, 2022, 48(6): 1-10.
|
[6] |
WANG Jinsong, YANG Weizheng, ZHAO Zening, WEI Jiajia.
Survey of Directed Acyclic Graph Based Blockchain Technology
[J]. Computer Engineering, 2022, 48(6): 11-23.
|
[7] |
CHEN Huang, CHEN Rui, KUANG Zhufang, HUANG Huajun.
A Frequency-domain Correlation Distributed Diffusion Least Mean Square Algorithm
[J]. Computer Engineering, 2022, 48(5): 215-221.
|
[8] |
WANG Zhijiang, QIN Pinle, CHAI Rui, WU Feng, CHENG Yitong, SHI Yue.
Automatic Identification Method of Tooth Impaction Based on Deep Learning
[J]. Computer Engineering, 2022, 48(4): 307-313.
|
[9] |
KONG Weigang, LI Wenjing, WANG Qiuyan, CAO Pengcheng, SONG Qingzeng.
Design and Implementation of Lightweight Network Based on Improved YOLOv4 Algorithm
[J]. Computer Engineering, 2022, 48(3): 181-188.
|
[10] |
YANG Ke, ZHANG Fan, GUO Wei, ZHAO Bo, MU Qing.
A Method for Solving the Metadata Randomness Problem of Mimic Storage
[J]. Computer Engineering, 2022, 48(2): 140-146,155.
|
[11] |
CUI Jingyang, CHEN Zhenguo, TIAN Liqin, ZHANG Guanghua.
Overview of User and Entity Behavior Analytics Technology Based on Machine Learning
[J]. Computer Engineering, 2022, 48(2): 10-24.
|
[12] |
ZHU Simeng, DU Ruiying, CHEN Jing, HE Kun.
Web Application Firewall Reinforcement Scheme Based on Recurrent Neural Network
[J]. Computer Engineering, 2022, 48(11): 120-126.
|
[13] |
SUN Pengyu, ZHANG Hengwei, TAN Jinglei, LI Chenwei, MA Junqiang, WANG Jindong.
Network Security Defense Decision Method Based on Time Game
[J]. Computer Engineering, 2022, 48(11): 145-151.
|
[14] |
BAI Caitong, CUI Xiaolong, LI Ai.
Robust Speech Recognition Technology Based on Federal Learning with Local Distillation
[J]. Computer Engineering, 2022, 48(10): 103-109.
|
[15] |
WEI Xiuran, WANG Feng.
Data Replication Strategy of Cloud Storage Based on Coordinator and Genetic Algorithm
[J]. Computer Engineering, 2021, 47(8): 124-130,139.
|