[1] |
Xu Lixin, Wu Huayao.
Collective Intelligence Based Software Engineering
[J]. Journal of Computer Research and Development, 2020, 57(3): 487-512.
|
[2] |
Qiu Yu, Wang Chi, Qi Kaiyue, Shen Yao, Li Chao, Zhang Chengmi, Guo Minyi.
A Survey of Smart Health: System Design from the Cloud to the Edge
[J]. Journal of Computer Research and Development, 2020, 57(1): 53-73.
|
[3] |
Wang Xiong, Dong Yihong, Shi Weijie, Pan Jianfei.
Progress and Challenges of Graph Summarization Techniques
[J]. Journal of Computer Research and Development, 2019, 56(6): 1338-1355.
|
[4] |
Wang Jice, Li Yilian, Jia Yan, Zhou Wei, Wang Yucheng, Wang He, Zhang Yuqing.
Survey of Smart Home Security
[J]. Journal of Computer Research and Development, 2018, 55(10): 2111-2124.
|
[5] |
Wei Shanshan, Xie Wei, He Zhiqiang.
Digital Video Stabilization Techniques: A Survey
[J]. Journal of Computer Research and Development, 2017, 54(9): 2044-2058.
|
[6] |
Liu Dan, Chen Guisheng, Song Chuanming, He Xing, Wang Xianghai.
Research Advances in Screen Content Coding Methods
[J]. Journal of Computer Research and Development, 2017, 54(9): 2059-2076.
|
[7] |
Zhang Yuqing, Zhou Wei, Peng Anni.
Survey of Internet of Things Security
[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143.
|
[8] |
He Yuan, Zheng Xiaolong.
Research on Wireless Network Co-Existence at 2.4 GHz
[J]. Journal of Computer Research and Development, 2016, 53(1): 26-37.
|
[9] |
Shan Yanhu, Zhang Zhang, Huang Kaiqi.
Visual Human Action Recognition: History, Status and Prospects
[J]. Journal of Computer Research and Development, 2016, 53(1): 93-112.
|
[10] |
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang.
Survey of Android Vulnerability Detection
[J]. Journal of Computer Research and Development, 2015, 52(10): 2167-2177.
|
[11] |
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen.
Survey of Android OS Security
[J]. Journal of Computer Research and Development, 2014, 51(7): 1385-1396.
|
[12] |
Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, and Chen Zhong,.
Research on Countermeasures Against Tag Spam
[J]. , 2013, 50(10): 2029-2043.
|
[13] |
Li Renfa, Xie Yong, Li Rui, and Li Lang.
Survey of Cyber-Physical Systems
[J]. , 2012, 49(6): 1149-1161.
|
[14] |
Jin Xin, Li Runheng, Gan Liang, and Li Zhengyi.
IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves
[J]. , 2012, 49(3): 481-490.
|
[15] |
Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan.
A DPA Resistant Technology Based on Register Switching Time Randomization
[J]. , 2012, 49(3): 491-498.
|