Most DownLoaded

1
Differential Fault Attack on Camellia
ZHOU Yongbin, WU Wenling, XU Nannan, FENG Dengguo
2009, 18(1): 13-19.
Abstract(1303) PDF(6958)
2
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.
Abstract(2228) PDF(6099)
3
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song
2019, 28(6): 1092-1098. doi: 10.1049/cje.2019.07.012
Abstract(1715) PDF(6000)
4
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai
2012, 21(2): 254-259.
Abstract(1865) PDF(5206)
5
A Global K-modes Algorithm for Clustering Categorical Data
BAI Tian, C.A. Kulikowski, GONG Leiguang, YANG Bin, HUANG Lan, ZHOU Chunguang
2012, 21(3): 460-465.
Abstract(1082) PDF(4773)
6
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
DUAN Baoyan
2020, 29(1): 1-15. doi: 10.1049/cje.2019.09.001
Abstract(2375) PDF(4596)
7
Sparse Representations for Speech Enhancement
ZHAO Nan, XU Xin, YANG Yi
2011, 20(2): 268-272.
Abstract(1383) PDF(4146)
8
An Enhanced IRC Algorithm for LTE Downlink Receiver in Multi-cell Environment
YAN Zhiting, HE Guanghui, MA Jun
2014, 23(2): 377-381.
Abstract(1228) PDF(4083)
9
The Wolf Colony Algorithm and Its Application
LIU Changan, YAN Xiaohu, LIU Chunyang, WU Hua
2011, 20(2): 212-216.
Abstract(1994) PDF(3912)
10
An Improved Current Mode Logic Latch
ZHANG Wei, ZHANG Liang, ZHANG Xu, MA Xuepo, LIU Yanyan
2013, 22(1): 214-218.
Abstract(1118) PDF(3704)
11
Some New Trends of Deep Learning Research
MENG Deyu, SUN Lina
2019, 28(6): 1087-1091. doi: 10.1049/cje.2019.07.011
Abstract(987) PDF(3353)
12
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou
2014, 23(2): 284-290.
Abstract(824) PDF(3160)
13
Secure DRM Scheme Based on Blockchain with High Credibility
MA Zhaofeng, HUANG Weihua, GAO Hongmin
2018, 27(5): 1025-1036. doi: 10.1049/cje.2018.07.003
Abstract(981) PDF(3055)
14
Ciphertext-Policy Attribute-Based Encryption with Short Keys
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing
2014, 23(4): 655-660.
Abstract(750) PDF(2866)
15
A Homomorphic Aggregate Signature Scheme Based on Lattice
2012, 21(4): 701-704.
Abstract(1027) PDF(2853)
16
Characteristics of Electric Charges Carried by Dust Particles and Their Effects on Connector Contact Failure
GAO Jinchun, XIE Gang
2012, 21(3): 559-565.
Abstract(982) PDF(2785)
17
Weighted Multi-source TrAdaBoost
CHENG Yuhu, CAO Ge, WANG Xuesong, PAN Jie
2013, 22(3): 505-510.
Abstract(966) PDF(2758)
18
A Novel Image Enhancement Method for SIFT Feature Extraction of Low Resolution Palmprint Images
LIU Di, SUN Dongmei, QIU Zhengding
2011, 20(1): 111-113.
Abstract(1094) PDF(2730)
19
A Survey on Emerging Computing Paradigms for Big Data
ZHANG Yaoxue, REN Ju, LIU Jiagang, XU Chugui, GUO Hui, LIU Yaping
2017, 26(1): 1-12. doi: 10.1049/cje.2016.11.016
Abstract(1428) PDF(2699)
20
nID-based Internet of Things and Its Application in Airport Aviation Risk Management
NING Huansheng, HU Sha, HE Wei, XU Qunyu, LIU Hong, CHEN Weishi
2012, 21(2): 209-214.
Abstract(1079) PDF(2670)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:5
  • To
  • Go