[1] |
Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG.
Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model
[J]. Journal of Computer Applications, 2023, 43(5): 1504-1510.
|
[2] |
Zhoubo XU, Puqing CHEN, Huadong LIU, Xin YANG.
Deep graph matching model based on self-attention network
[J]. Journal of Computer Applications, 2023, 43(4): 1005-1012.
|
[3] |
Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN.
Reversible data hiding in encrypted image based on multi-objective optimization
[J]. Journal of Computer Applications, 2022, 42(6): 1716-1723.
|
[4] |
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG.
Nonlinear scrambling diffusion synchronization image encryption based on dynamic network
[J]. Journal of Computer Applications, 2022, 42(1): 162-170.
|
[5] |
LI Shanshan, ZHAO Li, ZHANG Hongli.
Image grey level encryption based on cat map
[J]. Journal of Computer Applications, 2021, 41(4): 1148-1152.
|
[6] |
SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei.
Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing
[J]. Journal of Computer Applications, 2021, 41(10): 2893-2899.
|
[7] |
MA Minyao, LIU Zhuo, XU Yi, WU Lian.
Private-preserving determination problem of integer-interval positional relationship
[J]. Journal of Computer Applications, 2020, 40(9): 2657-2664.
|
[8] |
MA Minyao, WU Lian, LIU Zhuo, XU Yi.
Privacy-preserving determination of integer point-interval relationship
[J]. Journal of Computer Applications, 2020, 40(7): 1983-1988.
|
[9] |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang.
Integral attack on PICO algorithm based on division property
[J]. Journal of Computer Applications, 2020, 40(10): 2967-2972.
|
[10] |
YANG Xiaohua, GUO Jianquan.
Multi-period multi-decision closed-loop logistics network for fresh products with fuzzy variables
[J]. Journal of Computer Applications, 2019, 39(7): 2168-2174.
|
[11] |
GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui.
Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption
[J]. Journal of Computer Applications, 2019, 39(1): 239-244.
|
[12] |
SUN Yiru, LIANG Xiangqian, SHANG Yufang.
Identity based ring signature scheme in ideal lattice
[J]. Journal of Computer Applications, 2016, 36(7): 1861-1865.
|
[13] |
WU Qingxia, ZHOU Ya, WEN Diyao, HE Zhenghong.
Personalized trip itinerary recommendation based on user interests and points of interest popularity
[J]. Journal of Computer Applications, 2016, 36(6): 1762-1766.
|
[14] |
JIN Jianguo, XIAO Ying, DI Zhigang.
Image encryption based on chaotic dynamic random grouping and modulating fractional Fourier transform rotation factor
[J]. Journal of Computer Applications, 2016, 36(4): 966-972.
|
[15] |
JING Shibo, YANG Liming, LI Junhui, ZHANG Siyun.
Semi-supervised extreme learning machine and its application in analysis of near-infrared spectroscopy data
[J]. Journal of Computer Applications, 2016, 36(2): 387-391.
|