[1] |
SHI Yang, CHEN Zhao-yun, SUN Hai-yan, WANG Yao-hua, WEN Mei, HU Xiao.
Design of independent software stack of FT-Matrix DSP
[J]. Computer Engineering & Science, 2024, 46(06): 968-976.
|
[2] |
WU Xia, ZHENG Hong-ying, XIAO Di.
A dual-verification model watermarking scheme based on certification files
[J]. Computer Engineering & Science, 2024, 46(04): 647-656.
|
[3] |
ZHENG Kang, LI Chen, CHEN Hai-yan, LIU Sheng, FANG Liang.
Design and optimization of scalar memory access unit in VLIW DSPs
[J]. Computer Engineering & Science, 2023, 45(11): 1929-1940.
|
[4] |
YIN Jie, HUANG Xiao-yu, LIU Jia-yin, NIU Bo-wei, XIE Wen-wei, .
An Android malware detection method based on pre-trained language model
[J]. Computer Engineering & Science, 2023, 45(08): 1433-1442.
|
[5] |
GUO Pan-pan, CHEN Meng-xue, LIANG Zu-da, MA Xiao-chang, XU Bang-jian.
Optimization of dot product algorithms on FT-M7002
[J]. Computer Engineering & Science, 2022, 44(11): 1909-1917.
|
[6] |
JIAN Jie, LUO Zhang, LAI Ming-che, XIAO Li-quan, XU Wei-xia.
An adaptive high-speed channel equalizer based on deep neural network
[J]. Computer Engineering & Science, 2022, 44(04): 605-610.
|
[7] |
RUAN Ou, CHEN Ji-chen, MAO Hao.
An efficient batch verification algorithm for SM2 signatures
[J]. Computer Engineering & Science, 2021, 43(07): 1236-1242.
|
[8] |
LI Wei-an, XIONG Xiang-guang, XIA Dao-xun.
A color image robust watermarking algorithm based on Schur decomposition and chaotic scrambling
[J]. Computer Engineering & Science, 2021, 43(07): 1243-1249.
|
[9] |
CHEN Yong-hao, XIAO Jia-le, SU Tao.
Comparison of design schemes of a MobileNetV2 neural network processor
[J]. Computer Engineering & Science, 2021, 43(01): 24-32.
|
[10] |
WEI Liang1,2,HUANG Zhen-jie1,CHEN Qun-shan2.
Decentralized attribute-based undeniable signature
[J]. Computer Engineering & Science, 2020, 42(06): 1003-1011.
|
[11] |
LI Wei-an,XIONG Xiang-guang,XIA Dao-xun.
A robust watermarking algorithm based
on hyper-chaotic and Slant transform
[J]. Computer Engineering & Science, 2020, 42(05): 812-818.
|
[12] |
HU Jian-wei,ZHANG Yu,CUI Yan-peng.
Research on Android ransomware protection technology
[J]. Computer Engineering & Science, 2020, 42(04): 610-619.
|
[13] |
CHEN Yue-juan.
Research and practice of university library’s
digital reading platform in big data era
[J]. Computer Engineering & Science, 2019, 41(增刊S1): 245-248.
|
[14] |
CHEN Zi-hao,LI Qiang,GAN Jun,ZHANG Chao,LI Zu-rui.
VC Chain:An alliance audio-video
copyright blockchain system
[J]. Computer Engineering & Science, 2019, 41(11): 1939-1948.
|
[15] |
ZHANG Ling1,KUANG Jishun2.
Testing for reconfigurated faulty
digital microfluidic chips
[J]. Computer Engineering & Science, 2019, 41(03): 452-457.
|