Most DownLoaded

1
Survey on Fake Information Generation, Dissemination and Detection
CUI Wanqiu, WANG Dawei, HAN Na
2024, 33(3): 573-583. doi: 10.23919/cje.2022.00.362
Abstract(865) HTML(437) PDF(518)
2
Backdoor Attacks on Image Classification Models in Deep Neural Networks
ZHANG Quanxin, MA Wencong, WANG Yajie, ZHANG Yaoyuan, SHI Zhiwei, LI Yuanzhang
2022, 31(2): 199-212. doi: 10.1049/cje.2021.00.126
Abstract(3064) HTML(1450) PDF(467)
3
Review of GAN-Based Research on Chinese Character Font Generation
WANG Xuanhong, LI Cong, SUN Zengguo, HUI Luying
2024, 33(3): 584-600. doi: 10.23919/cje.2022.00.402
Abstract(844) HTML(421) PDF(420)
4
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
QIAO Wenxiao, SUN Siwei, HU Lei
2024, 33(3): 635-644. doi: 10.23919/cje.2023.00.127
Abstract(300) HTML(151) PDF(388)
5
A Survey on Graph Neural Network Acceleration: A Hardware Perspective
CHEN Shi, LIU Jingyu, SHEN Li
2024, 33(3): 601-622. doi: 10.23919/cje.2023.00.135
Abstract(519) HTML(259) PDF(385)
6
A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique
JIAO Zhipeng, CHEN Hua, FENG Jingyi, KUANG Xiaoyun, YANG Yiwei, LI Haoyuan, FAN Limin
2023, 32(2): 199-208. doi: 10.23919/cje.2021.00.089
Abstract(4124) HTML(1806) PDF(354)
7
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
WANG Yichuan, GAO Wen, HEI Xinhong, DU Yanning
2024, 33(3): 623-634. doi: 10.23919/cje.2022.00.196
Abstract(375) HTML(182) PDF(349)
8
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
WANG Hao, WANG Jinwei, HU Xuelong, HU Bingtao, YIN Qilin, LUO Xiangyang, MA Bin, SUN Jinsheng
2024, 33(3): 657-671. doi: 10.23919/cje.2022.00.179
Abstract(314) HTML(156) PDF(327)
9
A V2V Emergent Message Dissemination Scheme for 6G-Oriented Vehicular Networks
CHEN Chen, WANG Chenyu, CONG Li, XIAO Ming, PEI Qingqi
2023, 32(6): 1179-1191. doi: 10.23919/cje.2022.00.337
Abstract(725) HTML(364) PDF(322)
10
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
NIU Zequn, XUE Jingfeng, WANG Yong, LEI Tianwei, HAN Weijie, GAO Xianwei
2024, 33(3): 645-656. doi: 10.23919/cje.2022.00.360
Abstract(231) HTML(117) PDF(322)
11
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
ZHANG Yi, ZHANG Kai, CUI Ting
2024, 33(3): 672-682. doi: 10.23919/cje.2022.00.419
Abstract(304) HTML(154) PDF(309)
12
Characteristic Mode Analysis: Application to Electromagnetic Radiation, Scattering, and Coupling Problems
DENG Xuan, ZHANG Di, CHEN Yikai, YANG Shiwen
2023, 32(4): 663-677. doi: 10.23919/cje.2022.00.200
Abstract(1311) HTML(647) PDF(294)
13
A Fine-Grained Object Detection Model for Aerial Images Based on YOLOv5 Deep Neural Network
ZHANG Rui, XIE Cong, DENG Liwei
2023, 32(1): 51-63. doi: 10.23919/cje.2022.00.044
Abstract(3558) HTML(1488) PDF(238)
14
Investigation and Comparison of 5G Channel Models: From QuaDRiGa, NYUSIM, and MG5G Perspectives
PANG Lihua, ZHANG Jin, ZHANG Yang, HUANG Xinyi, CHEN Yijian, LI Jiandong
2022, 31(1): 1-17. doi: 10.1049/cje.2021.00.103
Abstract(5882) HTML(2705) PDF(226)
15
Corrigenda
2023, 32(4): 941-941.
Abstract(56) HTML(30) PDF(210)
16
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
WANG Zhibo, LIU Kaixin, HU Jiahui, REN Ju, GUO Hengchang, YUAN Wei
2023, 32(1): 1-12. doi: 10.23919/cje.2022.00.031
Abstract(3374) HTML(1526) PDF(205)
17
Trajectory Optimization and Power Allocation Scheme Based on DRL in Energy Efficient UAV-Aided Communication Networks
WANG Chaowei, CUI Yuling, DENG Danhao, WANG Weidong, JIANG Fan
2022, 31(3): 397-407. doi: 10.1049/cje.2021.00.314
Abstract(2400) HTML(1087) PDF(203)
18
Timely Data Delivery for Energy-Harvesting IoT Devices
LU Wenwei, GONG Siliang, ZHU Yihua
2022, 31(2): 322-336. doi: 10.1049/cje.2021.00.005
Abstract(678) HTML(324) PDF(199)
19
Hybrid Beamforming for Terahertz Wireless Communications with Beam Squint: A Survey
WU Yezeng, XIAO Lixia, LIU Guanghua, JIANG Tao
2022, 31(6): 1043-1052. doi: 10.1049/cje.2022.00.309
Abstract(3204) HTML(1415) PDF(190)
20
Energy-Efficient Driving Strategy for High-Speed Trains with Considering the Checkpoints
ZHANG Zixuan, CAO Yuan, SU Shuai
2024, 33(3): 847-858. doi: 10.23919/cje.2022.00.174
Abstract(468) HTML(231) PDF(173)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:21
  • To
  • Go