[1] |
Xingya YAN, Yaxi KUANG, Guangrui BAI, Yue LI.
Student Classroom Behavior Recognition Method Based on Deep Learning
[J]. Computer Engineering, 2023, 49(7): 251-258.
|
[2] |
MA Xiaodong, ZHAO Fan, REN Pengkun.
Visual Analysis of Resident Behavior Characteristics Based on Spatio-Temporal Data
[J]. Computer Engineering, 2023, 49(2): 105-111.
|
[3] |
LI Pan, XIE Qing, LI Lin, LIU Yongjian.
Knowledge-Enhanced Graph Neural Network Model for Sequential Recommendation
[J]. Computer Engineering, 2023, 49(2): 70-80.
|
[4] |
XIE Bailin, LI Qi, WEI Na, KUANG Jian.
Personality Trait Identification Method Based on User Behavior on Social Network
[J]. Computer Engineering, 2023, 49(1): 279-286,294.
|
[5] |
LING Peng, ZHU Tongyu, ZHOU Yi, WU Aizhi, ZHANG Peng.
Urban Functional Areas Identification Based on Crowd Travel Behavior Trajectory
[J]. Computer Engineering, 2022, 48(7): 36-41.
|
[6] |
ZHANG Yang, YAO Dengfeng, JIANG Minghu, LI Fanshu.
Fine-Grained Smoking Behavior Recognition Based on EfficientDet Network
[J]. Computer Engineering, 2022, 48(3): 302-309,314.
|
[7] |
CUI Jingyang, CHEN Zhenguo, TIAN Liqin, ZHANG Guanghua.
Overview of User and Entity Behavior Analytics Technology Based on Machine Learning
[J]. Computer Engineering, 2022, 48(2): 10-24.
|
[8] |
MENG Qianxia, YU Jiang, CHANG Jun, PU Yu, CHEN Cheng.
Behavior Recognition Method Based on Channel State Information in Through-the-Wall
[J]. Computer Engineering, 2021, 47(8): 201-209.
|
[9] |
TAO Tianyi, WANG Qingqin, FU Yuwei, XIONG Yun, YU Feng, YUAN Bo.
Personalized Recommendation Algorithm for Financial News Based on Knowledge Graph
[J]. Computer Engineering, 2021, 47(6): 98-103,114.
|
[10] |
MA Manfu, ZHANG Kaixuan, LI Yong, WANG Changqing, ZHANG Qiang.
Research on Behavioral Similarity among Online Homologous Users in Virtual Space
[J]. Computer Engineering, 2021, 47(5): 65-72.
|
[11] |
WANG Shuai, SONG Yurong, SONG Bo.
Epidemic Spreading Model Considering Individual Alert Behavior Using Bilayer Network
[J]. Computer Engineering, 2021, 47(3): 131-138.
|
[12] |
HUANG Ning, LIU Yuan, WANG Xiaofeng.
User Behavior Emulation Technology Based on Interactive Traffic Replay
[J]. Computer Engineering, 2021, 47(10): 103-110.
|
[13] |
ZHANG Pengming, ZHANG Xiaomei, HU Jianpeng.
Implicit Authentication Scheme for Smart Phone Based on Dynamic Trust Value
[J]. Computer Engineering, 2021, 47(10): 132-139,146.
|
[14] |
LIN Mengqi, ZHANG Xiaomei.
Identity Authentication of Multi-Modal Fusion Based on Behavioral Footprint
[J]. Computer Engineering, 2021, 47(10): 116-124.
|
[15] |
YANG Xueting, LI Zhong.
Identity Authentication Scheme Based on Vehicle Behavior Prediction for IoV
[J]. Computer Engineering, 2021, 47(1): 129-138.
|