| [1] |
ZHENG Weiwei, ZHENG Zhong, CHEN Wei, LU Hongyi.
Comparison and analysis of TAGE-based and neural-based branch predictors
[J]. Computer Engineering & Science, 2025, 47(8): 1364-1380.
|
| [2] |
LIU Jinzhu, ZHANG Dong, LI Guanyu.
A link prediction model based on dense convolution and multi-feature perception
[J]. Computer Engineering & Science, 2025, 47(8): 1483-1492.
|
| [3] |
CHEN Xu, CHEN Zixiong, JING Yongjun, WANG Shuyang, SONG Jifei.
A slice-level vulnerability detection method based on hyperbolic graph convolutional neural network
[J]. Computer Engineering & Science, 2025, 47(5): 851-863.
|
| [4] |
WANG Ying, YANG Qing , WANG Xiangyu , ZHANG Yong, .
Research on EEG signal emotion analysis based on asymmetric spatial features
[J]. Computer Engineering & Science, 2025, 47(5): 921-930.
|
| [5] |
XU Jinbo, DAI Yi, JIAN Jie.
A hardware offloading structure and method for ultra long vector reduction operation based on direct memory access and dynamic shared buffer
[J]. Computer Engineering & Science, 2025, 47(4): 571-581.
|
| [6] |
LI Zhenqi, WANG Qiang, QI Xingyun, LAI Mingche, ZHAO Yankang, LU Yihang, LI Yuan.
Design and FPGA implementation of lightweight convolutional neural network hardware acceleration
[J]. Computer Engineering & Science, 2025, 47(4): 582-591.
|
| [7] |
ZHU Qi, DAI Yi, PENG Jintao, XIE Min, LIANG Chongshan, LIU Peng, YANG Bo, LIU Jie, .
Optimization of MPI_Barrier based on the offloading characteristics of Tianhe-2
[J]. Computer Engineering & Science, 2025, 47(3): 400-411.
|
| [8] |
WANG Yuheng, LIU Qiang, WU Xiaojie.
RCGNN: Robustness certification for graph neural networks under graph injection attacks
[J]. Computer Engineering & Science, 2025, 47(3): 434-447.
|
| [9] |
JING Yongjun, WANG Hao, SHAO Kun, WANG Xiaofeng.
A network intrusion detection method based on graph heat kernel diffusion convolution
[J]. Computer Engineering & Science, 2025, 47(3): 459-471.
|
| [10] |
LI Jiao, GAO Leiyi, ZHANG Ruixin, WU Yue, DENG Hongxia.
A lightweight face super-resolution reconstruction method based on pulse attention mechanism
[J]. Computer Engineering & Science, 2025, 47(3): 494-503.
|
| [11] |
CHEN Yuling, LI Xiang.
Node classification with graph structure prompt in low-resource scenarios
[J]. Computer Engineering & Science, 2025, 47(3): 534-547.
|
| [12] |
HUANG Ying, TANG Min, .
Privacy-preserving gene testing based on deep neural network
[J]. Computer Engineering & Science, 2025, 47(2): 265-275.
|
| [13] |
HOU Xuan, LIANG Zhizhen, ZHANG Lei, LIU Bailong, ZHANG Xuefei.
Trajectory-user linking based on contextual global spatial graph
[J]. Computer Engineering & Science, 2025, 47(2): 336-348.
|
| [14] |
ZHU Jiajun, BAO Meikai, ZHANG Kai, LIU Ye, LIU Qi.
A commonsense question answering method based on multi-source knowledge infusion
[J]. Computer Engineering & Science, 2025, 47(2): 349-360.
|
| [15] |
LI Ruihong, LI Xiaohong, YAO Jin, WANG Shanshan.
A citation recommendation method based on dual-channel heterogeneous hypergraph neural networks
[J]. Computer Engineering & Science, 2025, 47(2): 361-369.
|