[1] |
WU Kaifan, YIN Xinchun.
Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system
[J]. Journal of Computer Applications, 2021, 41(6): 1621-1630.
|
[2] |
SUN Heli, SUN Yuzhu, ZHANG Xiaoyun.
Event description generation based on generative adversarial network
[J]. Journal of Computer Applications, 2021, 41(5): 1256-1261.
|
[3] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[4] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[5] |
SUN Heli, XU Tong, HE Liang, JIA Xiaolin.
Personalized social event recommendation method integrating user historical behaviors and social relationships
[J]. Journal of Computer Applications, 2021, 41(2): 324-329.
|
[6] |
CHEN Zhen, ZHONG Yiwen, LIN Juan.
Hybrid greedy genetic algorithm for solving 0-1 knapsack problem
[J]. Journal of Computer Applications, 2021, 41(1): 87-94.
|
[7] |
ZHANG Linghao, WANG Sheng, ZHOU Hui, CHEN Yifan, GUI Shenglin.
Secure communication scheme of unmanned aerial vehicle system based on MAVLink protocol
[J]. Journal of Computer Applications, 2020, 40(8): 2286-2292.
|
[8] |
PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun.
Design and implementation of Lite register model
[J]. Journal of Computer Applications, 2020, 40(5): 1369-1373.
|
[9] |
SHAN Xiaohuan, ZHANG Zhiguo, SONG Baoyan, REN Chenglin.
Activity recommendation method based on directed label graph and user feedback in event-based social network
[J]. Journal of Computer Applications, 2020, 40(2): 448-453.
|
[10] |
QIN Biao, GUO Fan, TU Fengtao.
Correctness verification of static taint analysis results for Android application
[J]. Journal of Computer Applications, 2019, 39(10): 3018-3027.
|
[11] |
SHEN Minjie, ZENG Zhenbing, LIN Wang, YANG Zhengfeng.
Safety verification of stochastic continuous system using stochastic barrier certificates
[J]. Journal of Computer Applications, 2018, 38(6): 1737-1744.
|
[12] |
XU Mingdi, GAO Yang, GAO Xueyuan, ZHANG Fan.
Correspondence property-based platform configuration attestation
[J]. Journal of Computer Applications, 2018, 38(2): 337-342.
|
[13] |
JIA Shangkun, HE Fei.
Software regression verification based on witness automata
[J]. Journal of Computer Applications, 2018, 38(10): 2990-2995.
|
[14] |
XU Xin, LIANG Jiuzhen.
Unconstrained face verification based on 3D frontalization and similarity learning
[J]. Journal of Computer Applications, 2018, 38(10): 2788-2793.
|
[15] |
LI Sai, LI Xiaoyu.
Mobile secure payment solution based on encrypted SMS verification code
[J]. Journal of Computer Applications, 2017, 37(8): 2270-2274.
|