[1] |
Shuo HUANG, Yanhui LI, Jianqiu CAO.
PrivSPM: frequent sequential pattern mining algorithm under local differential privacy
[J]. Journal of Computer Applications, 2023, 43(7): 2057-2064.
|
[2] |
Ran ZHAI, Xuebin CHEN, Guopeng ZHANG, Langtao PEI, Zheng MA.
Improved K-anonymity privacy protection algorithm based on different sensitivities
[J]. Journal of Computer Applications, 2023, 43(5): 1497-1503.
|
[3] |
Chunyong YIN, Rui QU.
Federated learning algorithm based on personalized differential privacy
[J]. Journal of Computer Applications, 2023, 43(4): 1160-1168.
|
[4] |
Yunbo LONG, Dan TANG.
Load balancing method based on local repair code in distributed storage
[J]. Journal of Computer Applications, 2023, 43(3): 767-775.
|
[5] |
Li YANG, Jianting CHEN, Yang XIANG.
Performance optimization strategy of distributed storage for industrial time series big data based on HBase
[J]. Journal of Computer Applications, 2023, 43(3): 759-766.
|
[6] |
Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI.
Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
[J]. Journal of Computer Applications, 2023, 43(10): 3028-3037.
|
[7] |
Guopeng ZHANG, Xuebin CHEN, Haoshi WANG, Ran ZHAI, Zheng MA.
K-Prototypes clustering method for local differential privacy
[J]. Journal of Computer Applications, 2022, 42(12): 3813-3821.
|
[8] |
Tiankai LIANG, Bi ZENG, Guang CHEN.
Federated learning survey:concepts, technologies, applications and challenges
[J]. Journal of Computer Applications, 2022, 42(12): 3651-3662.
|
[9] |
Rui SUN, Chao LI, Wei WANG, Endong TONG, Jian WANG, Jiqiang LIU.
Research progress of blockchain‑based federated learning
[J]. Journal of Computer Applications, 2022, 42(11): 3413-3420.
|
[10] |
Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG.
High-capacity reversible data hiding in encrypted videos based on histogram shifting
[J]. Journal of Computer Applications, 2022, 42(11): 3633-3638.
|
[11] |
Dong ZHU, Xinchun YIN, Jianting NING.
Certificateless signature scheme with strong privacy protection for internet of vehicles
[J]. Journal of Computer Applications, 2022, 42(10): 3091-3101.
|
[12] |
Cong XU, Xingtian WANG, Yongpeng TAO.
Reversible data hiding method based on high-order bit-plane redundancy
[J]. Journal of Computer Applications, 2022, 42(1): 171-177.
|
[13] |
LI Zhuo, SONG Zihui, SHEN Xin, CHEN Xin.
Local differential privacy protection mechanism for mobile crowd sensing with edge computing
[J]. Journal of Computer Applications, 2021, 41(9): 2678-2686.
|
[14] |
QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao.
Blockchain storage expansion model based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2021, 41(7): 1977-1982.
|
[15] |
QIN Jing, AN Wen, JI Changqing, WANG Zumin.
Review of privacy protection mechanisms in wireless body area network
[J]. Journal of Computer Applications, 2021, 41(4): 970-975.
|