[1] |
WEN Xin, ZENG Tao, LI Chun-bo, XU Zi-chen.
A switch method of model inference serving oriented to serverless computing
[J]. Computer Engineering & Science, 2024, 46(07): 1210-1217.
|
[2] |
DING Jian-ping, LI Wei-jun, LIU Xue-yang, CHEN Xu.
A review of named entity recognition research
[J]. Computer Engineering & Science, 2024, 46(07): 1296-1310.
|
[3] |
HUANG Zhi-hui, XIAO Xiang-li, ZHANG Yu-shu, XUE Ming-fu.
Copyright protection of open-sourced datasets based on invisible backdoor watermarking
[J]. Computer Engineering & Science, 2024, 46(06): 1013-1021.
|
[4] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[5] |
GAO Shan, LI Shi-jie, CAI Zhi-ping.
A survey of Chinese text classification based on deep learning
[J]. Computer Engineering & Science, 2024, 46(04): 684-692.
|
[6] |
HUANG Peng-cheng, FENG Chao-chao, MA Chi-yuan, .
Machine learning prediction of timing violation under unknown corners
[J]. Computer Engineering & Science, 2024, 46(03): 395-399.
|
[7] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(03): 440-452.
|
[8] |
ZHAO Yan, MA Hui-fang, WANG Wen-tao, TONG Hai-bin, HE Xiang-chun.
A reliable response representation enhanced knowledge tracing method
[J]. Computer Engineering & Science, 2024, 46(03): 535-544.
|
[9] |
DONG Yan-ling , ZHANG Shu-fen, XU Jing-cheng, WANG Hao-shi, .
Research on differential privacy protection for Stacking algorithm
[J]. Computer Engineering & Science, 2024, 46(02): 244-252.
|
[10] |
PENG Chang, LIU Qing-zhi, CHEN Chang-bo, .
Loop permutation and auto-tuning under polyhedral model
[J]. Computer Engineering & Science, 2023, 45(12): 2121-2134.
|
[11] |
WANG Hui, CHEN Yu, SHEN Zi-hao, LIU Pei-qian.
A trajectory data differential privacy protection scheme that combines contrast supervision and sorting tree
[J]. Computer Engineering & Science, 2023, 45(10): 1797-1805.
|
[12] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[13] |
ZHAO Zhen-yu, YANG Tian-hao, JIANG Wen-cheng, ZHANG Shu-zheng.
A machine learning-based fast calculation method of multi-voltage, multi-temperature and multi-parameter standard cell delay
[J]. Computer Engineering & Science, 2023, 45(08): 1331-1338.
|
[14] |
HOU Zhan-wei, LI Xin, WANG Hui, SHEN Zi-hao, LIU Kun, LIU Pei-qian.
A spatial crowdsourcing privacy preservation task allocation algorithm for road network
[J]. Computer Engineering & Science, 2023, 45(08): 1424-1432.
|
[15] |
LEI Xuan, CHENG Guang, ZHANG Yu-jian, GUO Liang, ZHANG Fu-cun.
Association analysis of alarm information based on power network situation awareness platform
[J]. Computer Engineering & Science, 2023, 45(07): 1197-1208.
|