Advanced Search

    column
    Performance Optimization of Neural Network Convolution Based on GPU Platform
    Li Maowen, Qu Guoyuan, Wei Dazhou, Jia Haipeng
    2022, 59(6): 1181-1191. DOI: 10.7544/issn1000-1239.20200985
    Abstract PDF
    A Data Distribution-Consistency-Based Estimation Method for Multiplexing Processor Hardware Performance Counters
    Lin Xinhua, Wang Jie, Wang Yichao, Zuo Sicheng
    2022, 59(6): 1192-1201. DOI: 10.7544/issn1000-1239.20200989
    Abstract PDF
    Fixed Priority Mixed-Criticality Sporadic Tasks Energy-Aware Algorithm
    Zhang Yiwen, Gao Zhenguo, Lin Mingwei
    2022, 59(6): 1202-1212. DOI: 10.7544/issn1000-1239.20210202
    Abstract PDF
    Research Progress of Continual Learning
    Han Yanan, Liu Jianwei, Luo Xionglin
    2022, 59(6): 1213-1239. DOI: 10.7544/issn1000-1239.20201058
    Abstract PDF
    A Fair Resource Allocation Scheme in Federated Learning
    Tian Jiahui, Lü Xixiang, Zou Renpeng, Zhao Bin, Li Yige
    2022, 59(6): 1240-1254. DOI: 10.7544/issn1000-1239.20201081
    Abstract PDF
    Domain Alignment Adversarial Unsupervised Cross-Domain Text Sentiment Analysis Algorithm
    Jia Xibin, Zeng Meng, Mi Qing, Hu Yongli
    2022, 59(6): 1255-1270. DOI: 10.7544/issn1000-1239.20210039
    Abstract PDF
    A Coloring Algorithm for Flower Line Drawings with Meticulous Effect Based on Semantic Matching of Reference Images
    Li Yuan, Chen Zhaojiong, Ye Dongyi
    2022, 59(6): 1271-1285. DOI: 10.7544/issn1000-1239.20201035
    Abstract PDF
    Compact Representation of Temporal Graphs Based on kd-MDD
    Li Fengying, Shen Huiqiang, Dong Rongsheng
    2022, 59(6): 1286-1296. DOI: 10.7544/issn1000-1239.20200856
    Abstract PDF
    Robot Path Planning Based on Improved Salp Swarm Algorithm
    Liu Jingsen, Yuan Mengmeng, Li Yu
    2022, 59(6): 1297-1314. DOI: 10.7544/issn1000-1239.20201016
    Abstract PDF
    Survey on Detecting and Defending Adversarial Examples for Image Data
    Zhang Tian, Yang Kuiwu, Wei Jianghong, Liu Yang, Ning Yuanlong
    2022, 59(6): 1315-1328. DOI: 10.7544/issn1000-1239.20200777
    Abstract PDF
    Trojan Traffic Detection Method Based on Semi-Supervised Deep Learning
    Gu Yonghao, Huang Boqi, Wang Jigang, Tian Tian, Liu Yan, Wu Yuesheng
    2022, 59(6): 1329-1342. DOI: 10.7544/issn1000-1239.20201014
    Abstract PDF
    Data Integrity Verification Scheme for Privacy Protection and Fair Payment
    Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang
    2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    Abstract PDF
    Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image
    Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng
    2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    Abstract PDF
    State-of-the-Art Survey of Compatibility Test for Android Mobile Application
    Zheng Wei, Tang Hui, Chen Xiang, Zhang Manqing, Xia Xin
    2022, 59(6): 1370-1387. DOI: 10.7544/issn1000-1239.20210105
    Abstract PDF
    Recommending Interface Patches for Linux Drivers Porting Based on Root Cause of Error
    Li Bin, He Yeping, Ma Hengtai, Rui Jianwu, Li Xiaozhuo
    2022, 59(6): 1388-1408. DOI: 10.7544/issn1000-1239.20201082
    Abstract PDF