[1] |
XU Liyun, YAN Tao, QIAN Yuhua.
Audio encryption algorithm in fractional domain based on cascaded chaotic system
[J]. Journal of Computer Applications, 2021, 41(9): 2623-2630.
|
[2] |
TANG Andi, HAN Tong, XU Dengwu, XIE Lei.
Path planning method of unmanned aerial vehicle based on chaos sparrow search algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 2128-2136.
|
[3] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[4] |
Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI.
Three-factor anonymous authentication and key agreement protocol
[J]. Journal of Computer Applications, 2021, 41(11): 3281-3287.
|
[5] |
XU Qiuyan, MA Liang, LIU Yong.
Yin-Yang-pair optimization algorithm based on chaos search and intricate operator
[J]. Journal of Computer Applications, 2020, 40(8): 2305-2312.
|
[6] |
HE Lifang, CHEN Jun, ZHANG Tianqi.
Correlation delay-DCSK chaotic communication scheme without inter-signal interference
[J]. Journal of Computer Applications, 2019, 39(7): 2014-2018.
|
[7] |
ZHANG Gang, HUAGN Nanfei, ZHANG Tianqi.
Performance analysis of multi-user orthogonal correlation delay keying scheme
[J]. Journal of Computer Applications, 2019, 39(5): 1425-1428.
|
[8] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[9] |
HUANG Bin, BAO Liyong, DING Hongwei.
Construction and characteristic analysis of Chebyshev mapping system based on homogenized distribution
[J]. Journal of Computer Applications, 2019, 39(10): 2997-3001.
|
[10] |
LIU Shanshan, GAO Fei, LI Wenqin.
Discretization process of coupled Logistic fractional-order differential equation
[J]. Journal of Computer Applications, 2019, 39(1): 305-310.
|
[11] |
WANG Songwei, CHEN Jianhua.
Multi-factor authentication key agreement scheme based on chaotic mapping
[J]. Journal of Computer Applications, 2018, 38(10): 2940-2944.
|
[12] |
LI Juan, YOU Xiaoming, LIU Sheng, CHEN Jia.
Dynamic chaotic ant colony system and its application in robot path planning
[J]. Journal of Computer Applications, 2018, 38(1): 126-131.
|
[13] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
A private set intersection protocol against malicious attack
[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598.
|
[14] |
MA Yiyuan, SONG Weiping, NING Aiping, NIU Haifan.
Cuckoo search algorithm for multi-objective optimization based on chaos cloud model
[J]. Journal of Computer Applications, 2017, 37(4): 1088-1092.
|
[15] |
ZHANG Bin, LI Yanhui, GUO Hao.
Cross-population differential evolution algorithm based on opposition-based learning
[J]. Journal of Computer Applications, 2017, 37(4): 1093-1099.
|