Top Download

1
Differential Fault Attack on Camellia
ZHOU Yongbin, WU Wenling, XU Nannan, FENG Dengguo
2009, 18(1): 13-19.
Abstract(618) PDF(6869)
2
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song
2019, 28(6): 1092-1098. doi: 10.1049/cje.2019.07.012
Abstract(101) PDF(5912)
3
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.
Abstract(230) PDF(5340)
4
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai
2012, 21(2): 254-259.
Abstract(1023) PDF(5151)
5
A Global K-modes Algorithm for Clustering Categorical Data
BAI Tian, C.A. Kulikowski, GONG Leiguang, YANG Bin, HUANG Lan, ZHOU Chunguang
2012, 21(3): 460-465.
Abstract(426) PDF(4728)
6
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
DUAN Baoyan
2020, 29(1): 1-15. doi: 10.1049/cje.2019.09.001
Abstract(337) PDF(4391)
7
An Enhanced IRC Algorithm for LTE Downlink Receiver in Multi-cell Environment
YAN Zhiting, HE Guanghui, MA Jun
2014, 23(2): 377-381.
Abstract(486) PDF(4053)
8
The Wolf Colony Algorithm and Its Application
LIU Changan, YAN Xiaohu, LIU Chunyang, WU Hua
2011, 20(2): 212-216.
Abstract(865) PDF(3737)
9
An Improved Current Mode Logic Latch
ZHANG Wei, ZHANG Liang, ZHANG Xu, MA Xuepo, LIU Yanyan
2013, 22(1): 214-218.
Abstract(411) PDF(3673)
10
Some New Trends of Deep Learning Research
MENG Deyu, SUN Lina
2019, 28(6): 1087-1091. doi: 10.1049/cje.2019.07.011
Abstract(76) PDF(3257)
11
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou
2014, 23(2): 284-290.
Abstract(193) PDF(3145)
12
Secure DRM Scheme Based on Blockchain with High Credibility
MA Zhaofeng, HUANG Weihua, GAO Hongmin
2018, 27(5): 1025-1036. doi: 10.1049/cje.2018.07.003
Abstract(37) PDF(3029)
13
Ciphertext-Policy Attribute-Based Encryption with Short Keys
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing
2014, 23(4): 655-660.
Abstract(254) PDF(2846)
14
A Homomorphic Aggregate Signature Scheme Based on Lattice
2012, 21(4): 701-704.
Abstract(316) PDF(2799)
15
Characteristics of Electric Charges Carried by Dust Particles and Their Effects on Connector Contact Failure
GAO Jinchun, XIE Gang
2012, 21(3): 559-565.
Abstract(259) PDF(2753)
16
A Novel Image Enhancement Method for SIFT Feature Extraction of Low Resolution Palmprint Images
LIU Di, SUN Dongmei, QIU Zhengding
2011, 20(1): 111-113.
Abstract(601) PDF(2703)
17
nID-based Internet of Things and Its Application in Airport Aviation Risk Management
NING Huansheng, HU Sha, HE Wei, XU Qunyu, LIU Hong, CHEN Weishi
2012, 21(2): 209-214.
Abstract(440) PDF(2647)
18
A Survey on Emerging Computing Paradigms for Big Data
ZHANG Yaoxue, REN Ju, LIU Jiagang, XU Chugui, GUO Hui, LIU Yaping
2017, 26(1): 1-12. doi: 10.1049/cje.2016.11.016
Abstract(262) PDF(2637)
19
A GPS Receiver Adaptive Digital Beamforming Interference Suppression Algorithm Based on Kalman Filter
DING Wenrui, ZHU Yunlong, ZHANG Bo, YANG Dongkai
2013, 22(2): 433-436.
Abstract(408) PDF(2610)
20
A Novel Approach to Detect the Unresolved Towed Decoy in Terminal Guidance
SONG Zhiyong, XIAO Huaitie, ZHU Yilong, LU Zaiqi
2012, 21(2): 367-373.
Abstract(335) PDF(2574)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:5
  • To
  • Go