[1] |
LI Zhuo, SONG Zihui, SHEN Xin, CHEN Xin.
Local differential privacy protection mechanism for mobile crowd sensing with edge computing
[J]. Journal of Computer Applications, 2021, 41(9): 2678-2686.
|
[2] |
QIN Jing, AN Wen, JI Changqing, WANG Zumin.
Review of privacy protection mechanisms in wireless body area network
[J]. Journal of Computer Applications, 2021, 41(4): 970-975.
|
[3] |
LIU Xiangyu, XIA Guoping, XIA Xiufeng, ZONG Chuanyu, ZHU Rui, LI Jiajia.
Personalized privacy protection for spatio-temporal data
[J]. Journal of Computer Applications, 2021, 41(3): 643-650.
|
[4] |
CHEN Zhen, ZHONG Yiwen, LIN Juan.
Hybrid greedy genetic algorithm for solving 0-1 knapsack problem
[J]. Journal of Computer Applications, 2021, 41(1): 87-94.
|
[5] |
CHEN Jinyu, LIU Zhaowei.
Internet of vehicles system based on improved proof of vote consensus protocol
[J]. Journal of Computer Applications, 2021, 41(1): 170-176.
|
[6] |
HE Hansen, SUN Guozi.
Fake news content detection model based on feature aggregation
[J]. Journal of Computer Applications, 2020, 40(8): 2189-2193.
|
[7] |
LYU Jiayu, ZHU Zhirong, YAO Zhiqiang.
Two-channel dynamic data encryption strategy in cloud computing environment
[J]. Journal of Computer Applications, 2020, 40(8): 2268-2273.
|
[8] |
YANG Yang, WANG Ruchuan.
Location based service location privacy protection method based on location security in augmented reality
[J]. Journal of Computer Applications, 2020, 40(5): 1364-1368.
|
[9] |
BAI Yameng, MAN Junfeng, ZHANG Hong.
Secure storage model of electronic health records based on blockchain
[J]. Journal of Computer Applications, 2020, 40(4): 961-965.
|
[10] |
LUO Huiwen, LONG Shigong.
Location perturbation algorithm based on geo-indistinguishability of user’s region of interest
[J]. Journal of Computer Applications, 2020, 40(3): 760-764.
|
[11] |
LIU Xiangyu, CHEN Jinmei, XIA Xiufeng, Manish Singh, ZONG Chuanyu, ZHU Rui.
Preventing location disclosure attacks through generating dummy trajectories
[J]. Journal of Computer Applications, 2020, 40(2): 479-485.
|
[12] |
ZHANG Meishu, XU Yabin.
Personalized privacy protection method for data with multiple numerical sensitive attributes
[J]. Journal of Computer Applications, 2020, 40(2): 491-496.
|
[13] |
LI Gongli, LI Yu, ZHANG En, YIN Tianyu.
Efficient genetic comparison scheme for user privacy protection
[J]. Journal of Computer Applications, 2020, 40(1): 136-142.
|
[14] |
FU Yu, WANG Hong.
Virtual trajectory filling algorithm for location privacy protection
[J]. Journal of Computer Applications, 2019, 39(8): 2318-2325.
|
[15] |
XU Jian, CHEN Zhide, GONG Ping, WANG Keke.
Secure storage and access scheme for medical records based on blockchain
[J]. Journal of Computer Applications, 2019, 39(5): 1500-1506.
|