Top Download

1
Differential Fault Attack on Camellia
ZHOU Yongbin, WU Wenling, XU Nannan, FENG Dengguo
2009, 18(1): 13-19.
Abstract(771) PDF(6888)
2
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.
Abstract(1151) PDF(5944)
3
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song
2019, 28(6): 1092-1098. doi: 10.1049/cje.2019.07.012
Abstract(822) PDF(5932)
4
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai
2012, 21(2): 254-259.
Abstract(1274) PDF(5172)
5
A Global K-modes Algorithm for Clustering Categorical Data
BAI Tian, C.A. Kulikowski, GONG Leiguang, YANG Bin, HUANG Lan, ZHOU Chunguang
2012, 21(3): 460-465.
Abstract(661) PDF(4742)
6
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
DUAN Baoyan
2020, 29(1): 1-15. doi: 10.1049/cje.2019.09.001
Abstract(756) PDF(4439)
7
An Enhanced IRC Algorithm for LTE Downlink Receiver in Multi-cell Environment
YAN Zhiting, HE Guanghui, MA Jun
2014, 23(2): 377-381.
Abstract(607) PDF(4057)
8
The Wolf Colony Algorithm and Its Application
LIU Changan, YAN Xiaohu, LIU Chunyang, WU Hua
2011, 20(2): 212-216.
Abstract(1083) PDF(3774)
9
An Improved Current Mode Logic Latch
ZHANG Wei, ZHANG Liang, ZHANG Xu, MA Xuepo, LIU Yanyan
2013, 22(1): 214-218.
Abstract(501) PDF(3673)
10
Some New Trends of Deep Learning Research
MENG Deyu, SUN Lina
2019, 28(6): 1087-1091. doi: 10.1049/cje.2019.07.011
Abstract(227) PDF(3274)
11
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou
2014, 23(2): 284-290.
Abstract(292) PDF(3146)
12
Secure DRM Scheme Based on Blockchain with High Credibility
MA Zhaofeng, HUANG Weihua, GAO Hongmin
2018, 27(5): 1025-1036. doi: 10.1049/cje.2018.07.003
Abstract(178) PDF(3031)
13
Ciphertext-Policy Attribute-Based Encryption with Short Keys
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing
2014, 23(4): 655-660.
Abstract(344) PDF(2848)
14
A Homomorphic Aggregate Signature Scheme Based on Lattice
2012, 21(4): 701-704.
Abstract(420) PDF(2804)
15
Characteristics of Electric Charges Carried by Dust Particles and Their Effects on Connector Contact Failure
GAO Jinchun, XIE Gang
2012, 21(3): 559-565.
Abstract(419) PDF(2755)
16
A Novel Image Enhancement Method for SIFT Feature Extraction of Low Resolution Palmprint Images
LIU Di, SUN Dongmei, QIU Zhengding
2011, 20(1): 111-113.
Abstract(700) PDF(2705)
17
nID-based Internet of Things and Its Application in Airport Aviation Risk Management
NING Huansheng, HU Sha, HE Wei, XU Qunyu, LIU Hong, CHEN Weishi
2012, 21(2): 209-214.
Abstract(554) PDF(2648)
18
A Survey on Emerging Computing Paradigms for Big Data
ZHANG Yaoxue, REN Ju, LIU Jiagang, XU Chugui, GUO Hui, LIU Yaping
2017, 26(1): 1-12. doi: 10.1049/cje.2016.11.016
Abstract(405) PDF(2643)
19
A GPS Receiver Adaptive Digital Beamforming Interference Suppression Algorithm Based on Kalman Filter
DING Wenrui, ZHU Yunlong, ZHANG Bo, YANG Dongkai
2013, 22(2): 433-436.
Abstract(528) PDF(2613)
20
A Novel Approach to Detect the Unresolved Towed Decoy in Terminal Guidance
SONG Zhiyong, XIAO Huaitie, ZHU Yilong, LU Zaiqi
2012, 21(2): 367-373.
Abstract(428) PDF(2577)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:5
  • To
  • Go