| [1] |
SHEN Lingzhen, WANG Xin, SHI Junhao, WANG Lu.
Research on pattern aware sampling algorithm
[J]. Computer Engineering & Science, 2025, 47(04): 740-750.
|
| [2] |
CHEN Yuling, LI Xiang.
Node classification with graph structure prompt in low-resource scenarios
[J]. Computer Engineering & Science, 2025, 47(03): 534-547.
|
| [3] |
WANG Lei, LIU Ran-ran.
An EDAS decision making method and its application based on a novel picture fuzzy distance
[J]. Computer Engineering & Science, 2024, 46(06): 1101-1111.
|
| [4] |
CHU Xu, NING Ai-bing, HU Kai-yuan, DAI Su-yu, ZHANG Hui-zhen.
A backtracking algorithm with reduction for the threshold-minimum dominating set problem
[J]. Computer Engineering & Science, 2024, 46(05): 897-906.
|
| [5] |
ZHANG Xiao-yan, WANG Jia-yi.
Efficiency measurement of attribute granulation under the background of three-way concept
[J]. Computer Engineering & Science, 2024, 46(04): 725-733.
|
| [6] |
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei.
A revocable traceable access control scheme in autonomous vehicle platoon
[J]. Computer Engineering & Science, 2024, 46(02): 232-243.
|
| [7] |
XIAO Zhen-guo, CHEN Lin-shu, SUN Shao-jie, MEI Ben-xia, LIU Yuan-hui, ZHAO Lei.
A clustering method based on algebraic granularity
[J]. Computer Engineering & Science, 2024, 46(01): 150-158.
|
| [8] |
ZHOU Shi-ji, TANG Xiao, ZHAO Rong-le, LIANG Yan-ling, .
An intuitionistic fuzzy three-way decision method based on perturbation dominance relationship
[J]. Computer Engineering & Science, 2023, 45(11): 2027-2035.
|
| [9] |
DING Yan, WANG Peng, WANG Chuang, LI Zhi-peng, SONG Lian-tao, FENG Liao-liao.
An attribute-based dynamic mandatory access control mechanism for operating system
[J]. Computer Engineering & Science, 2023, 45(10): 1770-1778.
|
| [10] |
XU Cheng-zhou, LI Lu, ZHANG Wen-tao.
An attribute-based encryption scheme supporting complex access policies
[J]. Computer Engineering & Science, 2023, 45(10): 1779-1788.
|
| [11] |
HAN Hui-yan, WANG Wen-jun, HAN Xie, KUANG Li-qun, XUE Hong-xin, .
A grasp pose estimation method combining semantic instance reconstruction
[J]. Computer Engineering & Science, 2023, 45(10): 1822-1829.
|
| [12] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(06): 1011-1019.
|
| [13] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(03): 443-452.
|
| [14] |
.
A TOPSIS method based on natural language cloud and its application
[J]. Computer Engineering & Science, 2023, 45(03): 565-570.
|
| [15] |
LI Tong-tong, WANG Shi-rui, ZHANG Yao-fang, WANG Bai-ling, WANG Zi-bo, LIU Hong-ri, .
Multi-dimensional attribute analysis of industrial control system vulnerability
[J]. Computer Engineering & Science, 2023, 45(02): 261-268.
|