| [1] | 
													
														WANG Jianping, WANG Gang, MAO Xiaobin, MA Enqi. 
														
															Motion control method of two-link manipulator based on deep reinforcement learning
														[J]. Journal of Computer Applications, 2021, 41(6): 1799-1804.
													 | 
												
																																																																																
													| [2] | 
													
														CHEN Jiahao, YIN Xinchun. 
														
															Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
														[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
													 | 
												
																																																																																
													| [3] | 
													
														GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. 
														
															Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
														[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
													 | 
												
																																																																																
													| [4] | 
													
														WU Zhijun, WANG Hang. 
														
															System wide information management emergency response mechanism based on subscribe/publish service
														[J]. Journal of Computer Applications, 2020, 40(5): 1340-1347.
													 | 
												
																																																																																
													| [5] | 
													
														YU Qingfei, TU Guangsheng, LI Ningbo, ZHOU Tanping. 
														
															Multi-hop multi-policy attributed-based fully homomorphic encryption scheme
														[J]. Journal of Computer Applications, 2019, 39(8): 2326-2332.
													 | 
												
																																																																																
													| [6] | 
													
														WANG Tiantian, YU Shuangyuan, XU Baomin. 
														
															Research on proof of work mining dilemma based on policy gradient algorithm
														[J]. Journal of Computer Applications, 2019, 39(5): 1336-1342.
													 | 
												
																																																																																
													| [7] | 
													
														WANG Yaqiong, SHI Guozhen, XIE Rongna, LI Fenghua, WANG Yazhe. 
														
															Multi-authority access control scheme with policy hiding of satellite network
														[J]. Journal of Computer Applications, 2019, 39(2): 470-475.
													 | 
												
																																																																																
													| [8] | 
													
														FENG Wenbo, HONG Zheng, WU Lifa, FU Menglin. 
														
															Review of network protocol recognition techniques
														[J]. Journal of Computer Applications, 2019, 39(12): 3604-3614.
													 | 
												
																																																																																
													| [9] | 
													
														MING Yang, HE Baokang. 
														
															Attribute revocation and verifiable outsourcing supported multi-authority attribute-based encryption scheme
														[J]. Journal of Computer Applications, 2019, 39(12): 3556-3562.
													 | 
												
																																																																																
													| [10] | 
													
														LUO Xiaofeng, YANG Xingchun, HU Yong. 
														
															Improved decision diagram for attribute-based access control policy evaluation and management
														[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
													 | 
												
																																																																																
													| [11] | 
													
														JI Ting, ZHANG Hua. 
														
															Nonparametric approximation policy iteration reinforcement learning based on Dyna framework
														[J]. Journal of Computer Applications, 2018, 38(5): 1230-1238.
													 | 
												
																																																																																
													| [12] | 
													
														LIU Mingcong, WANG Na. 
														
															Information flow control model for cloud composite service supporting Chinese Wall policy
														[J]. Journal of Computer Applications, 2018, 38(2): 310-315.
													 | 
												
																																																																																
													| [13] | 
													
														LIU Rong, PAN Hongzhi, LIU Bo, ZU Ting, FANG Qun, HE Xin, WANG Yang. 
														
															Data updating method for cloud storage based on ciphertext-policy attribute-based encryption
														[J]. Journal of Computer Applications, 2018, 38(2): 348-351.
													 | 
												
																																																																																
													| [14] | 
													
														PENG Liping, LYU Xiaodan, JIANG Chaohui, PENG Chenghui. 
														
															Elastic scheduling strategy for cloud resource based on Docker
														[J]. Journal of Computer Applications, 2018, 38(2): 557-562.
													 | 
												
																																																																																
													| [15] | 
													
														LI Qi, XIONG Jinbo, HUANG Lizhi, WANG Xuan, MAO Qiming, YAO Lanwu. 
														
															Attribute-based access control scheme in smart health
														[J]. Journal of Computer Applications, 2018, 38(12): 3471-3475.
													 |