| [1] |
RAO Yue, MA Xiaoning, CHENG Zhongfeng.
A generic perturbation-based defense framework for back-door attacks
[J]. Computer Engineering & Science, 2026, 48(1): 70-78.
|
| [2] |
LI Yan, FAN Xinyu, CHEN Qin.
A multi-path and multi-scale attention network for land cover segmentation
[J]. Computer Engineering & Science, 2026, 48(1): 108-118.
|
| [3] |
WAN Zhong1 , CHEN Renzhi1 , ZHANG Xiangyu2 , XU Shi1, ZHAO Jingyue1, AI Yongbao1, YANG Zhijie1 , WANG Lei1.
A safe and energy-efficient obstacle avoidance method for UAVs
[J]. Computer Engineering & Science, 2025, 47(9): 1658-1668.
|
| [4] |
CHENG Qihong1, LIU Peng1, YAO Lian1, YOU Zhiqiang2, WU Jigang1.
A fault tolerance scheme for memristive neural network under stuck-at faults
[J]. Computer Engineering & Science, 2025, 47(9): 1691-1699.
|
| [5] |
ZHANG Huan, LI Tao, HU Jin.
Analysis and optimization of the strip vertical differential structures
[J]. Computer Engineering & Science, 2025, 47(8): 1354-1363.
|
| [6] |
ZHENG Weiwei, ZHENG Zhong, CHEN Wei, LU Hongyi.
Comparison and analysis of TAGE-based and neural-based branch predictors
[J]. Computer Engineering & Science, 2025, 47(8): 1364-1380.
|
| [7] |
LIU Jinzhu, ZHANG Dong, LI Guanyu.
A link prediction model based on dense convolution and multi-feature perception
[J]. Computer Engineering & Science, 2025, 47(8): 1483-1492.
|
| [8] |
CHEN Xu, CHEN Zixiong, JING Yongjun, WANG Shuyang, SONG Jifei.
A slice-level vulnerability detection method based on hyperbolic graph convolutional neural network
[J]. Computer Engineering & Science, 2025, 47(5): 851-863.
|
| [9] |
WANG Ying, YANG Qing , WANG Xiangyu , ZHANG Yong, .
Research on EEG signal emotion analysis based on asymmetric spatial features
[J]. Computer Engineering & Science, 2025, 47(5): 921-930.
|
| [10] |
LI Zhenqi, WANG Qiang, QI Xingyun, LAI Mingche, ZHAO Yankang, LU Yihang, LI Yuan.
Design and FPGA implementation of lightweight convolutional neural network hardware acceleration
[J]. Computer Engineering & Science, 2025, 47(4): 582-591.
|
| [11] |
WANG Yuheng, LIU Qiang, WU Xiaojie.
RCGNN: Robustness certification for graph neural networks under graph injection attacks
[J]. Computer Engineering & Science, 2025, 47(3): 434-447.
|
| [12] |
JING Yongjun, WANG Hao, SHAO Kun, WANG Xiaofeng.
A network intrusion detection method based on graph heat kernel diffusion convolution
[J]. Computer Engineering & Science, 2025, 47(3): 459-471.
|
| [13] |
LI Jiao, GAO Leiyi, ZHANG Ruixin, WU Yue, DENG Hongxia.
A lightweight face super-resolution reconstruction method based on pulse attention mechanism
[J]. Computer Engineering & Science, 2025, 47(3): 494-503.
|
| [14] |
CHEN Yuling, LI Xiang.
Node classification with graph structure prompt in low-resource scenarios
[J]. Computer Engineering & Science, 2025, 47(3): 534-547.
|
| [15] |
HUANG Ying, TANG Min, .
Privacy-preserving gene testing based on deep neural network
[J]. Computer Engineering & Science, 2025, 47(2): 265-275.
|