| [1] |
CHEN Chuyi, LUO Xiongfei, YAN Baotong, FENG Yuxuan, MA Ke, QIAO Ying.
An adaptive cache management method for multi-layer recursive DNS
[J]. Computer Engineering & Science, 2025, 47(05): 823-831.
|
| [2] |
SU Yuhang, MA Jun, FAN Jinyu, CHEN Bohang, ZHOU Jiacheng, YIN Boran.
A WSN data stream anomaly detection algorithm based on GATv2-TCN joint optimization
[J]. Computer Engineering & Science, 2025, 47(05): 843-850.
|
| [3] |
CHEN Xu, CHEN Zixiong, JING Yongjun, WANG Shuyang, SONG Jifei.
A slice-level vulnerability detection method based on hyperbolic graph convolutional neural network
[J]. Computer Engineering & Science, 2025, 47(05): 851-863.
|
| [4] |
LI Shijie, LIU Yang, TANG Jintao, QIE Hang.
An isolated sets based parallel Louvain algorithm for community detection
[J]. Computer Engineering & Science, 2025, 47(04): 621-633.
|
| [5] |
LIANG Jiajie, XU Huiying, ZHU Xinzhong, WANG Shumeng, LIU Ziyang, LI Chen.
An improved marine animal object detection algorithm based on YOLOv8n: DPSC-YOLO
[J]. Computer Engineering & Science, 2025, 47(04): 695-705.
|
| [6] |
YIN Chunyong, ZHANG Xiaohu.
Log anomaly detection based on Transformer and Text-CNN
[J]. Computer Engineering & Science, 2025, 47(03): 448-458.
|
| [7] |
JING Yongjun, WANG Hao, SHAO Kun, WANG Xiaofeng.
A network intrusion detection method based on graph heat kernel diffusion convolution
[J]. Computer Engineering & Science, 2025, 47(03): 459-471.
|
| [8] |
LIU Yongmin, XU Cheng, HUANG Hao, ZHANG Qianlei, ZHAO Junjie, .
Research on intrusion detection method based on SAE and WGAN
[J]. Computer Engineering & Science, 2025, 47(02): 256-264.
|
| [9] |
LIANG Tairan, JIANG Shixin, LI Quanzhou, OUYANG Bin, Lv Shengping.
PCB surface defect dataset and detection based on YOLOv5s-P6SE
[J]. Computer Engineering & Science, 2025, 47(02): 276-287.
|
| [10] |
WANG Haiqun, WANG Bingnan, GE Chao.
A PCB defect detection algorithm based on improved ESP-YOLO
[J]. Computer Engineering & Science, 2025, 47(02): 317-326.
|
| [11] |
WU Peicheng, ZHAO Xujun, JIN Lizhong.
Anomaly detection of stream data based on grid density stacking
[J]. Computer Engineering & Science, 2025, 47(01): 75-85.
|
| [12] |
CHEN Zhaobo, ZHANG Lin, MA Xiaoxuan.
Video anomaly detection with improved attention hybrid auto-encoder
[J]. Computer Engineering & Science, 2025, 47(01): 130-139.
|
| [13] |
SHEN Fan-fan, TANG Xing-yi, ZHANG Jun, XU Chao, CHEN Yong, HE Yan-xiang.
Malicious behavior detection method based on iFA and improved LSTM network
[J]. Computer Engineering & Science, 2024, 46(12): 2158-2170.
|
| [14] |
LIU Pei, LIU Chang-hua, LIN Qiao-ling .
An intrusion detection model for vehicular networks based on optimized feature stacking and ensemb
[J]. Computer Engineering & Science, 2024, 46(12): 2186-2195.
|
| [15] |
XU Shu-ping, WEI Hao-bo, SUN Yang-yang, WAN Ya-juan.
Long-term object tracking based on template update and redetection
[J]. Computer Engineering & Science, 2024, 46(12): 2196-2204.
|