[1] |
Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG.
Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092.
|
[2] |
Rong HUANG, Junjie SONG, Shubo ZHOU, Hao LIU.
Image aesthetic quality evaluation method based on self-supervised vision Transformer
[J]. Journal of Computer Applications, 2024, 44(4): 1269-1276.
|
[3] |
Zheng WANG, Jingwei WANG, Xinchun YIN.
Searchable electronic health record sharing scheme with user revocation
[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
|
[4] |
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI.
Review of blockchain lightweight technology applied to internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3688-3698.
|
[5] |
Li LI, Chunyan YANG, Jiangwen ZHU, Ronglei HU.
User plagiarism identification scheme in social network under blockchain
[J]. Journal of Computer Applications, 2024, 44(1): 242-251.
|
[6] |
Wei TONG, Liyang HE, Rui LI, Wei HUANG, Zhenya HUANG, Qi LIU.
Efficient similar exercise retrieval model based on unsupervised semantic hashing
[J]. Journal of Computer Applications, 2024, 44(1): 206-216.
|
[7] |
Qiuyu ZHANG, Yongwang WEN.
Triplet deep hashing method for speech retrieval
[J]. Journal of Computer Applications, 2023, 43(9): 2910-2918.
|
[8] |
Yu TAN, Xiaoqin WANG, Rushi LAN, Zhenbing LIU, Xiaonan LUO.
Multi-label cross-modal hashing retrieval based on discriminative matrix factorization
[J]. Journal of Computer Applications, 2023, 43(5): 1349-1354.
|
[9] |
Yongjin HUANG, Yifang QIN, Xu ZHOU, Xinqing ZHANG.
Routing lookup algorithm with variable-length address based on AVL tree and Bloom filter
[J]. Journal of Computer Applications, 2023, 43(12): 3882-3889.
|
[10] |
Chundong WANG, Xin JIANG.
Improved practical Byzantine fault tolerance algorithm based on verifiable delay function
[J]. Journal of Computer Applications, 2023, 43(11): 3484-3489.
|
[11] |
Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI.
Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
[J]. Journal of Computer Applications, 2023, 43(10): 3028-3037.
|
[12] |
Yuntao ZHAO, Wanqi XIE, Weigang LI, Jiaming HU.
Robot hand-eye calibration algorithm based on covariance matrix adaptation evolutionary strategy
[J]. Journal of Computer Applications, 2023, 43(10): 3225-3229.
|
[13] |
Liefa LIAO, Zhiming LI, Saisai ZHANG.
Image retrieval method based on deep residual network and iterative quantization hashing
[J]. Journal of Computer Applications, 2022, 42(9): 2845-2852.
|
[14] |
Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG.
Data management method for building internet of things based on Hashgraph
[J]. Journal of Computer Applications, 2022, 42(8): 2471-2480.
|
[15] |
Xiaoyu WANG, Zhanqing WANG, Wei XIONG.
Deep asymmetric discrete cross-modal hashing method
[J]. Journal of Computer Applications, 2022, 42(8): 2461-2470.
|