[1] |
XIE Qing, ZHANG Lingfeng, MA Yanchun, LIU Yongjian.
Single Image Reflection Removal Model Based on Reflection Classifier and Gradient Restorer
[J]. Computer Engineering, 2025, 51(4): 227-238.
|
[2] |
QI Fenglin, SHEN Jiajie, WANG Maoyi, ZHANG Kai, WANG Xin.
Review of Application of Artificial Intelligence in University Informatization
[J]. Computer Engineering, 2025, 51(4): 1-14.
|
[3] |
LIU Zhuang, GU Kangzheng, TAN Xin, ZHANG Yuan.
Automatic Generation of Code for Heap Spraying Object Manipulation Targeting Kernel Vulnerability Exploitation
[J]. Computer Engineering, 2025, 51(4): 178-187.
|
[4] |
ZHANG Zhaoxin, HUANG Shize, ZHANG Bingjie, SHEN Tuo.
Camouflaged Adversarial Example Generation Method for the Form of Motion Blur in Traffic Scenes
[J]. Computer Engineering, 2025, 51(3): 45-53.
|
[5] |
LU Peng, ZHONG Chuang.
Improved CycleGAN Algorithm for Semi-Supervised Building Extraction
[J]. Computer Engineering, 2025, 51(3): 241-251.
|
[6] |
MAO Jingzheng, HU Xiaorui, XU Gengchen, WU Guodong, SUN Yanbin, TIAN Zhihong.
Review of Application Progress of Digital Twins in Industrial Control Security
[J]. Computer Engineering, 2025, 51(2): 1-17.
|
[7] |
ZHANG Huan, WANG Chen, SHAN Jingdong, QIU Runhe.
Elevator Safety Risk Prediction Based on Domain Adaptation and Attention Mechanism
[J]. Computer Engineering, 2025, 51(2): 86-93.
|
[8] |
HAN Juan, ZHOU Siqi, PING Ping.
Reversible Data Hiding in Encrypted Image Based on Quadtree Encryption and Adaptive Block Encoding
[J]. Computer Engineering, 2025, 51(2): 202-212.
|
[9] |
ZHAO Hong, SONG Furong, LI Wengai.
Research on Image Adversarial Example Generation Method Based on SE-AdvGAN
[J]. Computer Engineering, 2025, 51(2): 300-311.
|
[10] |
LIN Shuobin, CAI Jieyi, FANG Xiaocheng, ZHANG Zheng, LU Guangming, CHEN Bingzhi.
Adversarial Robust Distillation Method Based on Intensity Correlation Regularization Learning
[J]. Computer Engineering, 2025, 51(1): 42-50.
|
[11] |
WANG Yuanyuan, WANG Shiqian, WANG Han, GUO Zhengbin, HU Xiancheng.
Cross-Border Intelligent Analysis of Energy Emission Based on Vertical Federated Learning
[J]. Computer Engineering, 2025, 51(1): 164-173.
|
[12] |
GAO Qiuchen, HU Yonghua.
Design of PCIe Verification Platform in SoC Environment Based on UVM
[J]. Computer Engineering, 2024, 50(9): 189-196.
|
[13] |
WANG Yanguo, LÜ Pengyuan, LAN Jinjiang, LIU Mingzhe, QIN Guanjun, ZHANG Shuohua, ZHOU Yu.
Wind Turbine Fault Classification Method Based on Adversarial Training and Transformer
[J]. Computer Engineering, 2024, 50(9): 377-384.
|
[14] |
Qiong SHI, Hui DUAN, Zhibin SHI.
Trusted Task Offloading Scheme Based on Deep Reinforcement Learning
[J]. Computer Engineering, 2024, 50(8): 142-152.
|
[15] |
Suzhe WANG, Xueying ZHANG, Xiaoyu CHEN, Fenglian LI, Zeling WU.
EEG Enhancement Algorithm Based on Combination of Effective Attention and GAN
[J]. Computer Engineering, 2024, 50(8): 336-344.
|