[1] |
Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA.
Review of zero trust network and its key technologies
[J]. Journal of Computer Applications, 2023, 43(4): 1142-1150.
|
[2] |
Zhenjie XIE, Wei FU.
Error replica recovery mechanism for cloud storage based on auditable multiple replicas
[J]. Journal of Computer Applications, 2023, 43(4): 1102-1108.
|
[3] |
Wenshuai SONG, Miaolei DENG, Mimi MA, Haochen LI.
Research progress in public-key encryption with keyword search
[J]. Journal of Computer Applications, 2023, 43(3): 794-803.
|
[4] |
Yongdi LI, Caihong LI, Yaoyu ZHANG, Guosheng ZHANG.
Mobile robot path planning based on improved SAC algorithm
[J]. Journal of Computer Applications, 2023, 43(2): 654-660.
|
[5] |
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG.
Trusted integrity verification scheme of cloud data without bilinear pairings
[J]. Journal of Computer Applications, 2022, 42(12): 3769-3774.
|
[6] |
Jialiang DUAN, Guoming CAI, Kaiyong XU.
Memory combined feature classification method based on multiple BP neural networks
[J]. Journal of Computer Applications, 2022, 42(1): 178-182.
|
[7] |
QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao.
Blockchain storage expansion model based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2021, 41(7): 1977-1982.
|
[8] |
GAO Haoyu, LI Leixiao, LIN Hao, LI Jie, DENG Dan, LI Shaoxu.
Research and application progress of blockchain in area of data integrity protection
[J]. Journal of Computer Applications, 2021, 41(3): 745-755.
|
[9] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[10] |
Keyang CHENG, Chunyun MENG, Wenshan WANG, Wenxi SHI, Yongzhao ZHAN.
Research advances in disentangled representation learning
[J]. Journal of Computer Applications, 2021, 41(12): 3409-3418.
|
[11] |
SHI Meng'an, LU Zhenyu.
Power station rotary switch status recognition based on YOLO-tiny-RFB model
[J]. Journal of Computer Applications, 2020, 40(12): 3679-3686.
|
[12] |
DING Doujian, ZHAO Xiaolin, WANG Changgen, GAO Guangen, KOU Lei.
Autonomous localization and obstacle detection method of robot based on vision
[J]. Journal of Computer Applications, 2019, 39(6): 1849-1854.
|
[13] |
LI Zhaobin, LIU Zeyi, WEI Zhanzhen, HAN Yu.
Software defined network path security based on Hash chain
[J]. Journal of Computer Applications, 2019, 39(5): 1368-1373.
|
[14] |
XU Han, LUO Liang, SUN Peng, MENG Sa.
Cloud system security and performance modeling based on Markov model
[J]. Journal of Computer Applications, 2019, 39(11): 3304-3309.
|
[15] |
BAI Ping, ZHANG Wei, WANG Xu'an.
Homomorphic MACs for arithmetic circuits on cloud environment
[J]. Journal of Computer Applications, 2018, 38(9): 2543-2548.
|