Most DownLoaded

1
Differential Fault Attack on Camellia
ZHOU Yongbin, WU Wenling, XU Nannan, FENG Dengguo
2009, 18(1): 13-19.
Abstract(1188) PDF(6939)
2
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.
Abstract(2024) PDF(6053)
3
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song
2019, 28(6): 1092-1098. doi: 10.1049/cje.2019.07.012
Abstract(1610) PDF(5982)
4
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai
2012, 21(2): 254-259.
Abstract(1761) PDF(5196)
5
A Global K-modes Algorithm for Clustering Categorical Data
BAI Tian, C.A. Kulikowski, GONG Leiguang, YANG Bin, HUANG Lan, ZHOU Chunguang
2012, 21(3): 460-465.
Abstract(1027) PDF(4764)
6
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
DUAN Baoyan
2020, 29(1): 1-15. doi: 10.1049/cje.2019.09.001
Abstract(2174) PDF(4541)
7
Sparse Representations for Speech Enhancement
ZHAO Nan, XU Xin, YANG Yi
2011, 20(2): 268-272.
Abstract(1297) PDF(4129)
8
An Enhanced IRC Algorithm for LTE Downlink Receiver in Multi-cell Environment
YAN Zhiting, HE Guanghui, MA Jun
2014, 23(2): 377-381.
Abstract(1136) PDF(4074)
9
The Wolf Colony Algorithm and Its Application
LIU Changan, YAN Xiaohu, LIU Chunyang, WU Hua
2011, 20(2): 212-216.
Abstract(1871) PDF(3896)
10
An Improved Current Mode Logic Latch
ZHANG Wei, ZHANG Liang, ZHANG Xu, MA Xuepo, LIU Yanyan
2013, 22(1): 214-218.
Abstract(973) PDF(3691)
11
Some New Trends of Deep Learning Research
MENG Deyu, SUN Lina
2019, 28(6): 1087-1091. doi: 10.1049/cje.2019.07.011
Abstract(925) PDF(3322)
12
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou
2014, 23(2): 284-290.
Abstract(744) PDF(3155)
13
Secure DRM Scheme Based on Blockchain with High Credibility
MA Zhaofeng, HUANG Weihua, GAO Hongmin
2018, 27(5): 1025-1036. doi: 10.1049/cje.2018.07.003
Abstract(915) PDF(3046)
14
Ciphertext-Policy Attribute-Based Encryption with Short Keys
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing
2014, 23(4): 655-660.
Abstract(672) PDF(2858)
15
A Homomorphic Aggregate Signature Scheme Based on Lattice
2012, 21(4): 701-704.
Abstract(945) PDF(2847)
16
Characteristics of Electric Charges Carried by Dust Particles and Their Effects on Connector Contact Failure
GAO Jinchun, XIE Gang
2012, 21(3): 559-565.
Abstract(883) PDF(2775)
17
Weighted Multi-source TrAdaBoost
CHENG Yuhu, CAO Ge, WANG Xuesong, PAN Jie
2013, 22(3): 505-510.
Abstract(933) PDF(2753)
18
A Novel Image Enhancement Method for SIFT Feature Extraction of Low Resolution Palmprint Images
LIU Di, SUN Dongmei, QIU Zhengding
2011, 20(1): 111-113.
Abstract(995) PDF(2716)
19
A Survey on Emerging Computing Paradigms for Big Data
ZHANG Yaoxue, REN Ju, LIU Jiagang, XU Chugui, GUO Hui, LIU Yaping
2017, 26(1): 1-12. doi: 10.1049/cje.2016.11.016
Abstract(1317) PDF(2688)
20
nID-based Internet of Things and Its Application in Airport Aviation Risk Management
NING Huansheng, HU Sha, HE Wei, XU Qunyu, LIU Hong, CHEN Weishi
2012, 21(2): 209-214.
Abstract(1007) PDF(2665)
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:5
  • To
  • Go