共 39 条
- [1] Ni L., Li S.Q., Ma R.C., Et al., Hardware Trojans Detection and Protection, Digital Communication, 41, 1, pp. 59-63, (2014)
- [2] Xu Q., Jiang X.H., Yao L.H., Et al., Overview of the Detection and Prevention Study of Hardware Trojans, Chinese Journal of Network and Information Security, 3, 4, (2017)
- [3] Wang K., Chen H., Guan X.G., Et al., Research on Hardware Trojan Defense, Chinese Journal of Network and Information Security, 3, 9, (2017)
- [4] Su H., Zhou J., Zhang Z.H., Survey of Super-Resolution Image Reconstruction Methods, Acta Automatica Sinica, 39, 8, pp. 1202-1213, (2013)
- [5] Schultz R.R., Stevenson R.L., A Bayesian Approach to Image Expansion for Improved Definition, IEEE Transactions on Image Processing, 3, 3, pp. 233-242, (1994)
- [6] Hou H., Andrews H., Cubic Splines for Image Interpolation and Digital Filtering, IEEE Transactions on Acoustics, Speech, and Signal Processing, 26, 6, pp. 508-517, (1978)
- [7] Li X., Orchard M.T., New Edge-Directed Interpolation, IEEE Transactions on Image Processing, 10, 10, pp. 1521-1527, (2001)
- [8] Wang Q., Ward R.K., A New Orientation-Adaptive Interpolation Method, IEEE Transactions on Image Processing, 16, 4, pp. 889-900, (2007)
- [9] Huang T.S., Tsai R.Y., Multiframe Image Restoration and Registration, Advances in Computer Vision and Image Processing, pp. 317-339, (1984)
- [10] Irani M., Peleg S., Improving Resolution by Image Registration, CVGIP: Graphical Models and Image Processing, 53, 3, pp. 231-239, (1991)