[1] |
WANG Jianping, WANG Gang, MAO Xiaobin, MA Enqi.
Motion control method of two-link manipulator based on deep reinforcement learning
[J]. Journal of Computer Applications, 2021, 41(6): 1799-1804.
|
[2] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[3] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[4] |
WU Zhijun, WANG Hang.
System wide information management emergency response mechanism based on subscribe/publish service
[J]. Journal of Computer Applications, 2020, 40(5): 1340-1347.
|
[5] |
YU Qingfei, TU Guangsheng, LI Ningbo, ZHOU Tanping.
Multi-hop multi-policy attributed-based fully homomorphic encryption scheme
[J]. Journal of Computer Applications, 2019, 39(8): 2326-2332.
|
[6] |
WANG Tiantian, YU Shuangyuan, XU Baomin.
Research on proof of work mining dilemma based on policy gradient algorithm
[J]. Journal of Computer Applications, 2019, 39(5): 1336-1342.
|
[7] |
WANG Yaqiong, SHI Guozhen, XIE Rongna, LI Fenghua, WANG Yazhe.
Multi-authority access control scheme with policy hiding of satellite network
[J]. Journal of Computer Applications, 2019, 39(2): 470-475.
|
[8] |
FENG Wenbo, HONG Zheng, WU Lifa, FU Menglin.
Review of network protocol recognition techniques
[J]. Journal of Computer Applications, 2019, 39(12): 3604-3614.
|
[9] |
MING Yang, HE Baokang.
Attribute revocation and verifiable outsourcing supported multi-authority attribute-based encryption scheme
[J]. Journal of Computer Applications, 2019, 39(12): 3556-3562.
|
[10] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[11] |
JI Ting, ZHANG Hua.
Nonparametric approximation policy iteration reinforcement learning based on Dyna framework
[J]. Journal of Computer Applications, 2018, 38(5): 1230-1238.
|
[12] |
LIU Mingcong, WANG Na.
Information flow control model for cloud composite service supporting Chinese Wall policy
[J]. Journal of Computer Applications, 2018, 38(2): 310-315.
|
[13] |
LIU Rong, PAN Hongzhi, LIU Bo, ZU Ting, FANG Qun, HE Xin, WANG Yang.
Data updating method for cloud storage based on ciphertext-policy attribute-based encryption
[J]. Journal of Computer Applications, 2018, 38(2): 348-351.
|
[14] |
PENG Liping, LYU Xiaodan, JIANG Chaohui, PENG Chenghui.
Elastic scheduling strategy for cloud resource based on Docker
[J]. Journal of Computer Applications, 2018, 38(2): 557-562.
|
[15] |
LI Qi, XIONG Jinbo, HUANG Lizhi, WANG Xuan, MAO Qiming, YAO Lanwu.
Attribute-based access control scheme in smart health
[J]. Journal of Computer Applications, 2018, 38(12): 3471-3475.
|