[1] |
Yuhang CHEN, Yong YANG, Xianmusiya·Maimaitiming, Palidan·Tuerxun, Xiaochao FAN, Ge REN, Yufeng DIAO.
Automatic Essay Scoring Method Based on Topic Perception and Semantic Enhancement
[J]. Computer Engineering, 2024, 50(8): 363-371.
|
[2] |
LI Qin, LI Shaobo, HU Jie.
Research on Tourist Portrait Based on Joint Topic-Sentiment Analysis
[J]. Computer Engineering, 2022, 48(6): 278-287,294.
|
[3] |
ZHAO Bingyu, WANG Liusheng, ZHANG Meiling, ZHENG Dong.
Random Plaintext Collision Attack Against AES Algorithm with Reused Masks
[J]. Computer Engineering, 2022, 48(6): 139-145,153.
|
[4] |
LIAN Yixin, CHEN Tao, LI Wei, NAN Longmei.
Reconfigurable Research and Circuit Design of Two Types of Nonlinear Cryptographic Components
[J]. Computer Engineering, 2022, 48(2): 156-163,172.
|
[5] |
HU Zijie,ZHANG Fan,SHEN Jizhong,ZHAO Xinjie.
Remote Control Data Protection Method for Civilian UAV
[J]. Computer Engineering, 2019, 45(4): 100-107.
|
[6] |
FEI Yanjia,LI Fucui,SHAO Feng.
Image Aesthetic Assessment Based on Deep Learning
[J]. Computer Engineering, 2019, 45(3): 212-216,224.
|
[7] |
WANG Sixiang,ZHANG Lei,DUAN Xiaoyi,CUI Qi,GAO Xianwei.
Correlation Power Analysis Attack Based on Hilbert-Huang Transform Filtering Pretreatment
[J]. Computer Engineering, 2018, 44(7): 160-165,171.
|
[8] |
XIE Chuang,YANG Zhijia,WANG Jian.
Design of Industrial Wireless System-on-Chip Based on TSCH Mode
[J]. Computer Engineering, 2018, 44(6): 288-293,299.
|
[9] |
WANG Sixiang,ZHANG Lei,CUI Qi,GAO Xianwei,DUAN Xiaoyi.
Correlation Electromagnetic Analysis Attacks Based on Signal Amplified Technology
[J]. Computer Engineering, 2018, 44(4): 181-186,192.
|
[10] |
LI Xinchao,ZHONG Weidong,LIU Mingming,LI Dong.
S-box Implementation Scheme of SM4 Algorithm Based on Secret Sharing
[J]. Computer Engineering, 2018, 44(11): 148-153.
|
[11] |
CHEN Yuhan,DU Xuehui,BAO Yibao.
Design and Implementation of AES Algorithm Based on General Reconfigurable Processor
[J]. Computer Engineering, 2017, 43(5): 134-142.
|
[12] |
DUAN Xiaoyi,WANG Sixiang,CUI Qi,SUN Kewang.
A High-order Differential Power Analysis Attack Scheme with Masked AES Algorithm
[J]. Computer Engineering, 2017, 43(10): 120-125.
|
[13] |
XIANG Chunling,WU Zhen,RAO Jintao,WANG Min,DU Zhibo.
Correlation Power Analysis Attack in Frequency Domain for an AES Mask Algorithm
[J]. Computer Engineering, 2016, 42(10): 146-150.
|
[14] |
GAO Jinwei,MO Pengfei,YANG Jun,CHEN Zhijian.
Alogrithm of Fast Signed Integer Divison and Its Low-cost Implementation
[J]. Computer Engineering, 2015, 41(4): 311-315.
|
[15] |
WANG Jian-fei,MA De,XIONG Dong-liang,CHEN Liang,HUANG Kai,GE Hai-tong.
Encryption and Decryption Subsystem Based on Embedded CPU
[J]. Computer Engineering, 2014, 40(9): 183-189.
|