| [1] |
Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU.
Blockchain-based identity management system for internet of things
[J]. Journal of Computer Applications, 2025, 45(9): 2873-2881.
|
| [2] |
Bohan ZHANG, Le LYU, Junchang JING, Dong LIU.
Genetic algorithm-based community hiding method in attribute networks
[J]. Journal of Computer Applications, 2025, 45(9): 2817-2826.
|
| [3] |
Jintao SU, Lina GE, Liguang XIAO, Jing ZOU, Zhe WANG.
Detection and defense scheme for backdoor attacks in federated learning
[J]. Journal of Computer Applications, 2025, 45(8): 2399-2408.
|
| [4] |
Lina GE, Mingyu WANG, Lei TIAN.
Review of research on efficiency of federated learning
[J]. Journal of Computer Applications, 2025, 45(8): 2387-2398.
|
| [5] |
Yan YAN, Feifei LI, Yaqin LYU, Tao FENG.
Secure and efficient frequency estimation method based on shuffled differential privacy
[J]. Journal of Computer Applications, 2025, 45(8): 2600-2611.
|
| [6] |
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI.
Privacy protection method for consortium blockchain based on SM2 linkable ring signature
[J]. Journal of Computer Applications, 2025, 45(5): 1564-1572.
|
| [7] |
Qiang LI, Shaoxiong BAI, Yuan XIONG, Wei YUAN.
Privacy preserving localization of surveillance images based on large vision models
[J]. Journal of Computer Applications, 2025, 45(3): 832-839.
|
| [8] |
Baoyin WANG, Hongmei XUE, Qilie LIU, Tao GUO.
Privacy-preserving random consensus asset cross-chain scheme
[J]. Journal of Computer Applications, 2025, 45(2): 497-505.
|
| [9] |
Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG.
Review on security threats and defense measures in federated learning
[J]. Journal of Computer Applications, 2024, 44(6): 1663-1672.
|
| [10] |
Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG.
Location privacy protection algorithm based on trajectory perturbation and road network matching
[J]. Journal of Computer Applications, 2024, 44(5): 1546-1554.
|
| [11] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
| [12] |
Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO.
Attribute-based encryption scheme for blockchain privacy protection
[J]. Journal of Computer Applications, 2024, 44(2): 485-489.
|
| [13] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
| [14] |
Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Traceability storage model of charity system oriented to master-slave chain
[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758.
|
| [15] |
Rui GAO, Xuebin CHEN, Zucuan ZHANG.
Dynamic social network privacy publishing method for partial graph updating
[J]. Journal of Computer Applications, 2024, 44(12): 3831-3838.
|