| [1] |
JIN Xueqi1, 2, XU Hongquan3, HUANG Yinqiang4, SUN Zhihua5.
A novel malicious domain detection approach based on multi-perspective spatiotemporal alignment learning
[J]. Computer Engineering & Science, 2025, 47(8): 1417-1424.
|
| [2] |
CHEN Junyan1, LI Xinmei1, ZHU Changhong2, XIAO Wei3.
A routing optimization algorithm for software-defined optical transport network based on multi-view graph attention mechanism
[J]. Computer Engineering & Science, 2025, 47(7): 1193-1204.
|
| [3] |
LI Tianyun, LI Tao, WEN Dong, YANG Hui, ZHANG Yutao, LUO Xin, DONG Dezun.
A survey on artificial intelligence based congestion control
[J]. Computer Engineering & Science, 2025, 47(6): 1018-1027.
|
| [4] |
DI Jian, WAN Xue, JIANG Limei, .
An evolutionary reinforcement learning algorithm based on stochastic symmetric search
[J]. Computer Engineering & Science, 2025, 47(5): 912-920.
|
| [5] |
WEI Dong , JIA Yuchen, HAN Shaoran.
Reinforcement learning control for data center refrigeration systems
[J]. Computer Engineering & Science, 2025, 47(3): 422-433.
|
| [6] |
LIU Yongmin, XU Cheng, HUANG Hao, ZHANG Qianlei, ZHAO Junjie, .
Research on intrusion detection method based on SAE and WGAN
[J]. Computer Engineering & Science, 2025, 47(2): 256-264.
|
| [7] |
ZHANG Zheng, XIA Xiaoyun, CHEN Zefeng, XIANG Yi.
A staged strategy incorporating reinforcement learning to solve the travelling thief problem
[J]. Computer Engineering & Science, 2025, 47(1): 140-149.
|
| [8] |
YU Shirui, JIANG Chunmao.
A cloud computing virtual machine scheduling strategy based on fuzzy reinforcement learning
[J]. Computer Engineering & Science, 2025, 47(1): 56-65.
|
| [9] |
CHAI Xu-qing, QIAO Yi-hang, FAN Li-lin, .
A method for constructing performance analysis model of high performance application based on random forest classifier
[J]. Computer Engineering & Science, 2024, 46(7): 1218-1228.
|
| [10] |
ZHUANG Shu-xin, CHEN Yong-hong, HAO Yi-hang, WU Wei-wei, XU Xue-yong, WANG Wan-yuan.
A population diversity-based robust policy generation method in adversarial game environments#br#
[J]. Computer Engineering & Science, 2024, 46(6): 1081-1091.
|
| [11] |
YIN Chun-yong, ZHAO Feng.
An anomaly detection model of time series based on dual attention and deep autoencoder
[J]. Computer Engineering & Science, 2024, 46(5): 826-835.
|
| [12] |
DUAN Cheng-long, YUAN Jie, CHANG Qian-kun, ZHANG Ning-ning.
Inverse reinforcement learning algorithm based on D2GA
[J]. Computer Engineering & Science, 2024, 46(11): 2053-2062.
|
| [13] |
GU Ying-cheng, WEI Liu, JIANG Ning, CHENG Huan-yu, LIU Kai, SONG Yu, LIU Mei-zhao, TANG Lei, CHEN Yu, ZHANG Sheng.
Edge server assignment for distributed interactive applications in edge environments
[J]. Computer Engineering & Science, 2024, 46(10): 1748-1756.
|
| [14] |
CAI Yu, GUAN Zheng, WANG Zeng-wen, WANG Xue, YANG Zhi-jun.
Resource allocation algorithm for distinguished services in vehicular networks based on multi-agent deep reinforcement learning
[J]. Computer Engineering & Science, 2024, 46(10): 1757-1764.
|
| [15] |
ZENG Fan-feng, WANG Chun-zhen, LI Chen.
An unsupervised video summarization algorithm based on deep and shallow feature fusion
[J]. Computer Engineering & Science, 2023, 45(9): 1602-1610.
|