| [1] |
LI Tianyun, LI Tao, WEN Dong, YANG Hui, ZHANG Yutao, LUO Xin, DONG Dezun.
A survey on artificial intelligence based congestion control
[J]. Computer Engineering & Science, 2025, 47(6): 1018-1027.
|
| [2] |
PENG Lin, ZHANG Peng, CHEN Junfeng, TANG Tao, HUANG Chun.
Selection of sparse matrix multiplication algorithms based on supervised learning
[J]. Computer Engineering & Science, 2025, 47(3): 381-391.
|
| [3] |
CHEN Wenjin.
QTorch:A quantum-classical hybrid machine learning framework built on a standalone quantum programming language
[J]. Computer Engineering & Science, 2025, 47(3): 412-421.
|
| [4] |
WANG Yufei, LIU Qiang, ZHANG Weizhen, WU Xiaojie, LI Jiawen, WANG Yuheng.
rtTorTIM: A real-time Tor traffic identification method based on multi-modal feature fusion and Stacking ensemble learning
[J]. Computer Engineering & Science, 2025, 47(2): 238-246.
|
| [5] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(9): 1606-1615.
|
| [6] |
WANG Yong-jun, LIU Han-yang, WANG Hui, SHEN Zi-hao, LIU Kun, LIU Pei-qian.
A privacy-preserving region-sensitive crowdsensing task allocation mechanism
[J]. Computer Engineering & Science, 2024, 46(8): 1414-1424.
|
| [7] |
WEN Xin, ZENG Tao, LI Chun-bo, XU Zi-chen.
A switch method of model inference serving oriented to serverless computing
[J]. Computer Engineering & Science, 2024, 46(7): 1210-1217.
|
| [8] |
DING Jian-ping, LI Wei-jun, LIU Xue-yang, CHEN Xu.
A review of named entity recognition research
[J]. Computer Engineering & Science, 2024, 46(7): 1296-1310.
|
| [9] |
HUANG Zhi-hui, XIAO Xiang-li, ZHANG Yu-shu, XUE Ming-fu.
Copyright protection of open-sourced datasets based on invisible backdoor watermarking
[J]. Computer Engineering & Science, 2024, 46(6): 1013-1021.
|
| [10] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(6): 1032-1040.
|
| [11] |
GAO Shan, LI Shi-jie, CAI Zhi-ping.
A survey of Chinese text classification based on deep learning
[J]. Computer Engineering & Science, 2024, 46(4): 684-692.
|
| [12] |
HUANG Peng-cheng, FENG Chao-chao, MA Chi-yuan, .
Machine learning prediction of timing violation under unknown corners
[J]. Computer Engineering & Science, 2024, 46(3): 395-399.
|
| [13] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(3): 440-452.
|
| [14] |
ZHAO Yan, MA Hui-fang, WANG Wen-tao, TONG Hai-bin, HE Xiang-chun.
A reliable response representation enhanced knowledge tracing method
[J]. Computer Engineering & Science, 2024, 46(3): 535-544.
|
| [15] |
DONG Yan-ling , ZHANG Shu-fen, XU Jing-cheng, WANG Hao-shi, .
Research on differential privacy protection for Stacking algorithm
[J]. Computer Engineering & Science, 2024, 46(2): 244-252.
|