[1] |
WANG Yongzhen, TONG Ming, YAN Xuefeng, WEI Mingqiang.
Transformer-CNN-based Multi-feature Aggregation Algorithm for Real Battlefield Image Dehazing
[J]. Acta Armamentarii, 2024, 45(4): 1070-1081.
|
[2] |
XIONG Jiamei, WANG Yongzhen, YAN Xuefeng, WEI Mingqiang.
An Algorithm of Battlefield Image Desmoking Based on Semantic Guidance and Contrastive Learning
[J]. Acta Armamentarii, 2024, 45(2): 671-683.
|
[3] |
CAO Dai , ZHAN Siyu , HAO Xinsheng , GUAN Kai , FU Haotong .
Scheduling Strategy of Aviation Information Network Service Function Chain Requirements
[J]. Acta Armamentarii, 0, (): 0-0.
|
[4] |
WANG Gang, WANG Zhiyi, ZHANG Enning, MA Runnian, CHEN Tongrui.
Markov Evolutionary Game Model and Migration Strategies for Multi-stage Platform Dynamic Defense
[J]. Acta Armamentarii, 2021, 42(8): 1690-1697.
|
[5] |
HUANG Yingchun, MOU Xinming.
A Fuzzy Comprehensive Evaluation Method for Attack Effectiveness of the Application Layer of Command Information System
[J]. Acta Armamentarii, 2020, 41(5): 932-940.
|
[6] |
WANG Zengguang, LU Yu, LI Xi.
Active Defense Strategy Selection of Military Information Network Based on Incomplete Information Game
[J]. Acta Armamentarii, 2020, 41(3): 608-617.
|
[7] |
WU Tianhao, WANG Jingsong, NIU Kan, SUN Miao, WU Shaoqiang.
Adaptive Dynamic Indicators Configuration Method for Dealing with Electromagnetic Interference in Battlefield
[J]. Acta Armamentarii, 2019, 40(8): 1648-1657.
|
[8] |
LI Eryu, GONG Jianxing, HUANG Jian.
Analysis about Functional Invulnerability of Convergent Network Based on Function Chain
[J]. Acta Armamentarii, 2019, 40(7): 1450-1459.
|
[9] |
ZHANG Shi, ZHANG Bai-hai, WANG Fei-fan, GUAN Zi-xiao.
Node Localization Algorithm Based on Hop-count Quantization in Wireless Sensor Networks
[J]. Acta Armamentarii, 2017, 38(5): 932-939.
|
[10] |
LI Xu, HE Hao-xiong, PENG Jin-lin, SONG Gu-yang, SHAO Xiao-tao.
A Hybrid Routing Protocol for Differentiating Route Frequencies in MANET
[J]. Acta Armamentarii, 2016, 37(12): 2308-2316.
|
[11] |
HE Shao-tong, XUE Lun-sheng, CHEN Xi-hong, ZHANG Kai.
Anti-fracture Technology of Ad Hoc Network Routing in Tropospheric Scatter Channel
[J]. Acta Armamentarii, 2016, 37(12): 2317-2323.
|
[12] |
FENG Yong-xin, ZHAO Yun-tao, SU Guang-nan, HUANG Ying-chun.
A Fuzzy Efficiency Evaluation Method for SOAP Flooding Attack
[J]. Acta Armamentarii, 2015, 36(11): 2203-2208.
|
[13] |
QIAN Yu-wen, SONG Hua-jü, KONG Jian-shou, ZHU Xiao-mei.
Study on the Module of Network Thumb Printer Based on Network Covert Time Channel
[J]. Acta Armamentarii, 2012, 33(1): 19-25.
|
[14] |
MA Jun-chun, SUN Ji-yin, WANG Yong-jun, ZHAO Bao-kang, CHEN Shan.
Study of Attack Graph Construction Based on Distributed Parallel Processing
[J]. Acta Armamentarii, 2012, 33(1): 109-115.
|
[15] |
LI Xiaohang, ZHANG Zhihu, SONG Chunlin, WU Qiang, DONG Fangyong.
Adaptive Compensation Control under False Data Injection Attack
[J]. Acta Armamentarii, 2020, 41(11): 2260-2265.
|