Most DownLoaded

1
Survey on Fake Information Generation, Dissemination and Detection
CUI Wanqiu, WANG Dawei, HAN Na
2024, 33(3): 573-583. doi: 10.23919/cje.2022.00.362
Abstract(993) HTML(502) PDF(523)
2
Backdoor Attacks on Image Classification Models in Deep Neural Networks
ZHANG Quanxin, MA Wencong, WANG Yajie, ZHANG Yaoyuan, SHI Zhiwei, LI Yuanzhang
2022, 31(2): 199-212. doi: 10.1049/cje.2021.00.126
Abstract(3118) HTML(1477) PDF(468)
3
Review of GAN-Based Research on Chinese Character Font Generation
WANG Xuanhong, LI Cong, SUN Zengguo, HUI Luying
2024, 33(3): 584-600. doi: 10.23919/cje.2022.00.402
Abstract(968) HTML(483) PDF(422)
4
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
QIAO Wenxiao, SUN Siwei, HU Lei
2024, 33(3): 635-644. doi: 10.23919/cje.2023.00.127
Abstract(321) HTML(161) PDF(390)
5
A Survey on Graph Neural Network Acceleration: A Hardware Perspective
CHEN Shi, LIU Jingyu, SHEN Li
2024, 33(3): 601-622. doi: 10.23919/cje.2023.00.135
Abstract(558) HTML(279) PDF(389)
6
A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique
JIAO Zhipeng, CHEN Hua, FENG Jingyi, KUANG Xiaoyun, YANG Yiwei, LI Haoyuan, FAN Limin
2023, 32(2): 199-208. doi: 10.23919/cje.2021.00.089
Abstract(4162) HTML(1824) PDF(355)
7
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
WANG Yichuan, GAO Wen, HEI Xinhong, DU Yanning
2024, 33(3): 623-634. doi: 10.23919/cje.2022.00.196
Abstract(386) HTML(187) PDF(351)
8
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
WANG Hao, WANG Jinwei, HU Xuelong, HU Bingtao, YIN Qilin, LUO Xiangyang, MA Bin, SUN Jinsheng
2024, 33(3): 657-671. doi: 10.23919/cje.2022.00.179
Abstract(333) HTML(165) PDF(329)
9
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
NIU Zequn, XUE Jingfeng, WANG Yong, LEI Tianwei, HAN Weijie, GAO Xianwei
2024, 33(3): 645-656. doi: 10.23919/cje.2022.00.360
Abstract(258) HTML(130) PDF(324)
10
A V2V Emergent Message Dissemination Scheme for 6G-Oriented Vehicular Networks
CHEN Chen, WANG Chenyu, CONG Li, XIAO Ming, PEI Qingqi
2023, 32(6): 1179-1191. doi: 10.23919/cje.2022.00.337
Abstract(760) HTML(381) PDF(322)
11
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
ZHANG Yi, ZHANG Kai, CUI Ting
2024, 33(3): 672-682. doi: 10.23919/cje.2022.00.419
Abstract(325) HTML(164) PDF(311)
12
Characteristic Mode Analysis: Application to Electromagnetic Radiation, Scattering, and Coupling Problems
DENG Xuan, ZHANG Di, CHEN Yikai, YANG Shiwen
2023, 32(4): 663-677. doi: 10.23919/cje.2022.00.200
Abstract(1345) HTML(663) PDF(297)
13
A Fine-Grained Object Detection Model for Aerial Images Based on YOLOv5 Deep Neural Network
ZHANG Rui, XIE Cong, DENG Liwei
2023, 32(1): 51-63. doi: 10.23919/cje.2022.00.044
Abstract(3582) HTML(1499) PDF(240)
14
Investigation and Comparison of 5G Channel Models: From QuaDRiGa, NYUSIM, and MG5G Perspectives
PANG Lihua, ZHANG Jin, ZHANG Yang, HUANG Xinyi, CHEN Yijian, LI Jiandong
2022, 31(1): 1-17. doi: 10.1049/cje.2021.00.103
Abstract(5901) HTML(2714) PDF(229)
15
Corrigenda
2023, 32(4): 941-941.
Abstract(62) HTML(33) PDF(210)
16
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
WANG Zhibo, LIU Kaixin, HU Jiahui, REN Ju, GUO Hengchang, YUAN Wei
2023, 32(1): 1-12. doi: 10.23919/cje.2022.00.031
Abstract(3390) HTML(1534) PDF(206)
17
Trajectory Optimization and Power Allocation Scheme Based on DRL in Energy Efficient UAV-Aided Communication Networks
WANG Chaowei, CUI Yuling, DENG Danhao, WANG Weidong, JIANG Fan
2022, 31(3): 397-407. doi: 10.1049/cje.2021.00.314
Abstract(2410) HTML(1092) PDF(204)
18
Timely Data Delivery for Energy-Harvesting IoT Devices
LU Wenwei, GONG Siliang, ZHU Yihua
2022, 31(2): 322-336. doi: 10.1049/cje.2021.00.005
Abstract(694) HTML(331) PDF(200)
19
Hybrid Beamforming for Terahertz Wireless Communications with Beam Squint: A Survey
WU Yezeng, XIAO Lixia, LIU Guanghua, JIANG Tao
2022, 31(6): 1043-1052. doi: 10.1049/cje.2022.00.309
Abstract(3239) HTML(1432) PDF(192)
20
Energy-Efficient Driving Strategy for High-Speed Trains with Considering the Checkpoints
ZHANG Zixuan, CAO Yuan, SU Shuai
2024, 33(3): 847-858. doi: 10.23919/cje.2022.00.174
Abstract(490) HTML(242) PDF(175)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:21
  • To
  • Go