| [1] |
LI Junzhe, FU Zhenxin, YANG Honghui, MA Yinping, LI Ruomiao, FAN Chun, .
Design and implementation of a cross-cluster data migration system for computational networks
[J]. Computer Engineering & Science, 2025, 47(05): 775-786.
|
| [2] |
ZHANG Lina, XIN Peng, HOU Minghui, LIU Miao, YUE Hengyi.
An information hiding scheme of two-level QR code using extended Hamming code
[J]. Computer Engineering & Science, 2025, 47(05): 832-842.
|
| [3] |
YU Zhiyuan, SONG Huihui, .
Multi-scale fully aggregated network for spatiotemporal fusion of remote sensing images
[J]. Computer Engineering & Science, 2025, 47(05): 864-874.
|
| [4] |
ZHAO Xueyan, ZHANG Zhao, JIA Jingwen, ZHOU Hongyan, CHEN Xuebo.
An image encryption algorithm based on double random phase encoding with double chaotic system and compressed sensing
[J]. Computer Engineering & Science, 2025, 47(05): 885-893.
|
| [5] |
JIA Chunbo, CHEN Guang, YAO Xinan, LI Baofeng.
High-power multiphase power supply technology based on domestic devices
[J]. Computer Engineering & Science, 2025, 47(04): 592-600.
|
| [6] |
XUE Kailai , JIA Xiangdong , HAN Xianghua, NIU Xiayang, ZHANG Liang.
Information freshness analysis of nonlinear information state update system based on nonlinear energy harvesting
[J]. Computer Engineering & Science, 2025, 47(04): 644-654.
|
| [7] |
GONG Haocheng, ZHU Hai, HUANG Zifei, YANG Mingze, ZHANG Kaiyu, WU Fei.
A representation knowledge distillation-based WiFi gesture recognition method
[J]. Computer Engineering & Science, 2025, 47(04): 655-666.
|
| [8] |
ZHANG Jinlong, WU Min, SUN Yubao.
3D axial Transformer model for kidney tumor segmentation in CT images
[J]. Computer Engineering & Science, 2025, 47(04): 677-685.
|
| [9] |
LIANG Jiajie, XU Huiying, ZHU Xinzhong, WANG Shumeng, LIU Ziyang, LI Chen.
An improved marine animal object detection algorithm based on YOLOv8n: DPSC-YOLO
[J]. Computer Engineering & Science, 2025, 47(04): 695-705.
|
| [10] |
CHEN Wenjin.
QTorch:A quantum-classical hybrid machine learning framework built on a standalone quantum programming language
[J]. Computer Engineering & Science, 2025, 47(03): 412-421.
|
| [11] |
YIN Chunyong, ZHANG Xiaohu.
Log anomaly detection based on Transformer and Text-CNN
[J]. Computer Engineering & Science, 2025, 47(03): 448-458.
|
| [12] |
LIAN Zihan, HE Weifeng.
High-performance processor design based on dynamic timing slack exploitation
[J]. Computer Engineering & Science, 2025, 47(02): 219-227.
|
| [13] |
JIA Haozhou, XU Peng , WANG Danchen, XU Yang, .
A RFID mutual authentication protocol based on a novel confusion operation
[J]. Computer Engineering & Science, 2025, 47(02): 247-255.
|
| [14] |
XU Tianyou, GAO Guangyong.
Robust image hiding by invertible generative adversarial network
[J]. Computer Engineering & Science, 2025, 47(02): 288-297.
|
| [15] |
LU Jianyun, SHAO Junming.
A clustering algorithm based on the multi-level density center graph
[J]. Computer Engineering & Science, 2025, 47(02): 327-335.
|