Most DownLoaded

1
Differential Fault Attack on Camellia
ZHOU Yongbin, WU Wenling, XU Nannan, FENG Dengguo
2009, 18(1): 13-19.
Abstract(956) PDF(6914)
2
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.
Abstract(1574) PDF(6000)
3
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song
2019, 28(6): 1092-1098. doi: 10.1049/cje.2019.07.012
Abstract(1147) PDF(5952)
4
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai
2012, 21(2): 254-259.
Abstract(1526) PDF(5181)
5
A Global K-modes Algorithm for Clustering Categorical Data
BAI Tian, C.A. Kulikowski, GONG Leiguang, YANG Bin, HUANG Lan, ZHOU Chunguang
2012, 21(3): 460-465.
Abstract(854) PDF(4752)
6
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
DUAN Baoyan
2020, 29(1): 1-15. doi: 10.1049/cje.2019.09.001
Abstract(1233) PDF(4471)
7
Sparse Representations for Speech Enhancement
ZHAO Nan, XU Xin, YANG Yi
2011, 20(2): 268-272.
Abstract(1140) PDF(4115)
8
An Enhanced IRC Algorithm for LTE Downlink Receiver in Multi-cell Environment
YAN Zhiting, HE Guanghui, MA Jun
2014, 23(2): 377-381.
Abstract(798) PDF(4059)
9
The Wolf Colony Algorithm and Its Application
LIU Changan, YAN Xiaohu, LIU Chunyang, WU Hua
2011, 20(2): 212-216.
Abstract(1490) PDF(3854)
10
An Improved Current Mode Logic Latch
ZHANG Wei, ZHANG Liang, ZHANG Xu, MA Xuepo, LIU Yanyan
2013, 22(1): 214-218.
Abstract(684) PDF(3674)
11
Some New Trends of Deep Learning Research
MENG Deyu, SUN Lina
2019, 28(6): 1087-1091. doi: 10.1049/cje.2019.07.011
Abstract(489) PDF(3299)
12
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou
2014, 23(2): 284-290.
Abstract(468) PDF(3149)
13
Secure DRM Scheme Based on Blockchain with High Credibility
MA Zhaofeng, HUANG Weihua, GAO Hongmin
2018, 27(5): 1025-1036. doi: 10.1049/cje.2018.07.003
Abstract(483) PDF(3039)
14
Ciphertext-Policy Attribute-Based Encryption with Short Keys
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing
2014, 23(4): 655-660.
Abstract(479) PDF(2851)
15
A Homomorphic Aggregate Signature Scheme Based on Lattice
2012, 21(4): 701-704.
Abstract(637) PDF(2825)
16
Characteristics of Electric Charges Carried by Dust Particles and Their Effects on Connector Contact Failure
GAO Jinchun, XIE Gang
2012, 21(3): 559-565.
Abstract(593) PDF(2760)
17
Weighted Multi-source TrAdaBoost
CHENG Yuhu, CAO Ge, WANG Xuesong, PAN Jie
2013, 22(3): 505-510.
Abstract(783) PDF(2741)
18
A Novel Image Enhancement Method for SIFT Feature Extraction of Low Resolution Palmprint Images
LIU Di, SUN Dongmei, QIU Zhengding
2011, 20(1): 111-113.
Abstract(822) PDF(2708)
19
A Survey on Emerging Computing Paradigms for Big Data
ZHANG Yaoxue, REN Ju, LIU Jiagang, XU Chugui, GUO Hui, LIU Yaping
2017, 26(1): 1-12. doi: 10.1049/cje.2016.11.016
Abstract(809) PDF(2662)
20
nID-based Internet of Things and Its Application in Airport Aviation Risk Management
NING Huansheng, HU Sha, HE Wei, XU Qunyu, LIU Hong, CHEN Weishi
2012, 21(2): 209-214.
Abstract(763) PDF(2655)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:5
  • To
  • Go