A deep Q network method for dynamic arterial coordinated control
郭瑝清1,陈 锋1,2
Dual stream ConvNet-Gan for person re-identification
林 通,陈 新,唐 晓,贺 玲,李 浩
Gait recognition method based on frequency domain attention spatio-temporal convolutional network
赵国顺1,2,方建安1,2,瞿斌杰1,2,Samah A.F.Manssor1,2,孙韶媛1,2
Research on eye localization method based on fatigue driving
杜永昂,杨耀权,金玥佟
Hierarchical double attention network for aspect sentiment analysis
宋 婷1,陈战伟2
Recognition method of similar-shaped objects based on improved LeNet-5
郑 睿1,2,余 童1,2,程龙阅1
Design of penetration test platform based on TrackRay
范 晶,焦运良,戴贻康
Research on virtualization scheme of domestic trusted root TCM in cloud environment
赵 军1,王 晓2
Design and implementation of IPSec VPN based on national secret algorithm
张 尧,刘笑凯
Design of a high-speed PAM4 optical transmitter with large current
李 喜,林福江
Construction of step billing algorithm and its application design in gas meter
高柱荣1,蒋昌茂2,刘洪林3
Multi-band circularly polarized antenna for satellite navigation system
臧志斌1,傅 宁1,马 军1,夏传福1,吴小鸥1,陈伟强2
Research on composite control method of aircraft rudder electric servo system
朱国威,姜梦馨,林 丛,门若霖,刘晓琳,王 楠,杨洪利
Synchronization of multi-agent systems with error constraints based on barrier Lyapunov function
吴慕兰
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。