[1] |
Zidong CHENG, Peng LI, Feng ZHU.
Potential relation mining in internet of things threat intelligence knowledge graph
[J]. Journal of Computer Applications, 2025, 45(1): 24-31.
|
[2] |
Lingxia MU, Zhengjun ZHOU, Ban WANG, Youmin ZHANG, Xianghong XUE, Kaikai NING.
Formation obstacle-avoidance and reconfiguration method for multiple UAVs
[J]. Journal of Computer Applications, 2024, 44(9): 2938-2946.
|
[3] |
Guiyong LI, Bin HE, Lei FANG.
Key generation algorithm based on cyclic grouping of difference thresholds
[J]. Journal of Computer Applications, 2024, 44(7): 2110-2115.
|
[4] |
Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN.
Review of marine ship communication cybersecurity
[J]. Journal of Computer Applications, 2024, 44(7): 2123-2136.
|
[5] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[6] |
Jingxian ZHOU, Xina LI.
UAV detection and recognition based on improved convolutional neural network and radio frequency fingerprint
[J]. Journal of Computer Applications, 2024, 44(3): 876-882.
|
[7] |
Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity authentication scheme based on certificate-less signcryption
[J]. Journal of Computer Applications, 2024, 44(12): 3731-3740.
|
[8] |
Keshuo SUN, Haiying GAO, Yang SONG.
Multi-authority attribute-based encryption scheme for private blockchain over public blockchain
[J]. Journal of Computer Applications, 2024, 44(12): 3699-3708.
|
[9] |
Yan SHI, Yue WU, Dongqing ZHAO.
Hybrid intelligent reflecting surface and relay assisted secure transmission scheme based on cooperative interference
[J]. Journal of Computer Applications, 2024, 44(12): 3893-3898.
|
[10] |
Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI.
Survey of software security testing techniques in DevSecOps
[J]. Journal of Computer Applications, 2024, 44(11): 3470-3478.
|
[11] |
Jie WU, Xuezhong QIAN, Wei SONG.
Personalized federated learning based on similarity clustering and regularization
[J]. Journal of Computer Applications, 2024, 44(11): 3345-3353.
|
[12] |
Jianyang CUI, Ying CAI, Yu ZHANG, Yanfang FAN.
Authenticatable privacy-preserving scheme based on signcryption from lattice for vehicular ad hoc network
[J]. Journal of Computer Applications, 2024, 44(1): 233-241.
|
[13] |
Juangui NING, Guofang DONG.
Blockchain-based vehicle-to-infrastructure fast handover authentication scheme in VANET
[J]. Journal of Computer Applications, 2024, 44(1): 252-260.
|
[14] |
Tong CHEN, Jiwei WEI, Shiyuan HE, Jingkuan SONG, Yang YANG.
Adversarial training method with adaptive attack strength
[J]. Journal of Computer Applications, 2024, 44(1): 94-100.
|
[15] |
Bona XUAN, Jin LI, Yafei SONG, Zexuan MA.
Malicious code classification method based on improved MobileNetV2
[J]. Journal of Computer Applications, 2023, 43(7): 2217-2225.
|