相似文献/References:
[1]杨雄,朱宇光.伪造接入点技术的智能手机拒绝服务攻防策略[J].计算机技术与发展,2013,(10):134.
YANG Xiong[],ZHU Yu-guang[].Strategy of Denial of Service Attack and Defense to Smart Phones of Faked Access Point[J].,2013,(02):134.
[2]吴春香,张建明.无线感知网络中动作识别的滤波算法[J].计算机技术与发展,2018,28(05):86.[doi:10.3969/j.issn.1673-629X.2018.05.020]
WU Chun-xiang,ZHANG Jian-ming.Filtering Algorithm for Motion Recognition in Wireless Sensor Networks[J].,2018,28(02):86.[doi:10.3969/j.issn.1673-629X.2018.05.020]
[3]王拥军,马维华.一种基于 CSI 相位差的手势识别方法[J].计算机技术与发展,2020,30(04):14.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 003]
WANG Yong-jun,MA Wei-hua.A Gesture Recognition Method Based on CSI Phase Difference[J].,2020,30(02):14.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 003]
[4]丁文超,张俊宝,阴庚雷.基于 CRNN 的 CSI 动作识别[J].计算机技术与发展,2021,31(06):7.[doi:10. 3969 / j. issn. 1673-629X. 2021. 06. 002]
DING Wen-chao,ZHANG Jun-bao,YIN Geng-lei.CSI Action Recognition Based on CRNN[J].,2021,31(02):7.[doi:10. 3969 / j. issn. 1673-629X. 2021. 06. 002]
[5]刘 伟,程春玲,杜金楷,等.一种基于改进深度卷积模型的室内定位方法[J].计算机技术与发展,2022,32(08):155.[doi:10. 3969 / j. issn. 1673-629X. 2022. 08. 025]
LIU Wei,CHENG Chun-ling,DU Jin-kai,et al.An Indoor Positioning Method Based on Improved Deep Convolution Mode[J].,2022,32(02):155.[doi:10. 3969 / j. issn. 1673-629X. 2022. 08. 025]
[6]马永连*,张登银.基于域自适应网络的跨场景摔倒检测算法研究[J].计算机技术与发展,2023,33(10):86.[doi:10. 3969 / j. issn. 1673-629X. 2023. 10. 014]
MA Yong-lian*,ZHANG Deng-yin.Cross-scene Fall Detection Algorithm Based on Domain Adaptive Network[J].,2023,33(02):86.[doi:10. 3969 / j. issn. 1673-629X. 2023. 10. 014]