共 39 条
[1]
Ni L., Li S.Q., Ma R.C., Et al., Hardware Trojans Detection and Protection, Digital Communication, 41, 1, pp. 59-63, (2014)
[2]
Xu Q., Jiang X.H., Yao L.H., Et al., Overview of the Detection and Prevention Study of Hardware Trojans, Chinese Journal of Network and Information Security, 3, 4, (2017)
[3]
Wang K., Chen H., Guan X.G., Et al., Research on Hardware Trojan Defense, Chinese Journal of Network and Information Security, 3, 9, (2017)
[4]
Su H., Zhou J., Zhang Z.H., Survey of Super-Resolution Image Reconstruction Methods, Acta Automatica Sinica, 39, 8, pp. 1202-1213, (2013)
[5]
Schultz R.R., Stevenson R.L., A Bayesian Approach to Image Expansion for Improved Definition, IEEE Transactions on Image Processing, 3, 3, pp. 233-242, (1994)
[6]
Hou H., Andrews H., Cubic Splines for Image Interpolation and Digital Filtering, IEEE Transactions on Acoustics, Speech, and Signal Processing, 26, 6, pp. 508-517, (1978)
[7]
Li X., Orchard M.T., New Edge-Directed Interpolation, IEEE Transactions on Image Processing, 10, 10, pp. 1521-1527, (2001)
[8]
Wang Q., Ward R.K., A New Orientation-Adaptive Interpolation Method, IEEE Transactions on Image Processing, 16, 4, pp. 889-900, (2007)
[9]
Huang T.S., Tsai R.Y., Multiframe Image Restoration and Registration, Advances in Computer Vision and Image Processing, pp. 317-339, (1984)
[10]
Irani M., Peleg S., Improving Resolution by Image Registration, CVGIP: Graphical Models and Image Processing, 53, 3, pp. 231-239, (1991)