| [1] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. 
														
															Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
														[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. | 
																																																																																
													| [2] | Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG. 
														
															Efficient reversible data hiding scheme based on two-dimensional modulo operations
														[J]. Journal of Computer Applications, 2024, 44(6): 1880-1888. | 
																																																																																
													| [3] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. 
														
															Review on security threats and defense measures in federated learning
														[J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. | 
																																																																																
													| [4] | Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG. 
														
															Location privacy protection algorithm based on trajectory perturbation and road network matching
														[J]. Journal of Computer Applications, 2024, 44(5): 1546-1554. | 
																																																																																
													| [5] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. 
														
															Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
														[J]. Journal of Computer Applications, 2024, 44(3): 811-818. | 
																																																																																
													| [6] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. 
														
															Attribute-based encryption scheme for blockchain privacy protection
														[J]. Journal of Computer Applications, 2024, 44(2): 485-489. | 
																																																																																
													| [7] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. 
														
															Linkable ring signature scheme based on SM9 algorithm
														[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. | 
																																																																																
													| [8] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. 
														
															Traceability storage model of charity system oriented to master-slave chain
														[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. | 
																																																																																
													| [9] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. 
														
															Development, technologies and applications of blockchain 3.0
														[J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. | 
																																																																																
													| [10] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. 
														
															Dynamic social network privacy publishing method for partial graph updating
														[J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. | 
																																																																																
													| [11] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. 
														
															Progress and prospect of zero-knowledge proof enabling blockchain
														[J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. | 
																																																																																
													| [12] | Yifan WANG, Shaofu LIN, Yunjiang LI. 
														
															Highway free-flow tolling method based on blockchain and zero-knowledge proof
														[J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. | 
																																																																																
													| [13] | Xuebin CHEN, Changsheng QU. 
														
															Overview of backdoor attacks and defense in federated learning
														[J]. Journal of Computer Applications, 2024, 44(11): 3459-3469. | 
																																																																																
													| [14] | Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE. 
														
															Deep shadow defense scheme of federated learning based on generative adversarial network
														[J]. Journal of Computer Applications, 2024, 44(1): 223-232. | 
																																																																																
													| [15] | Shuo HUANG, Yanhui LI, Jianqiu CAO. 
														
															PrivSPM: frequent sequential pattern mining algorithm under local differential privacy
														[J]. Journal of Computer Applications, 2023, 43(7): 2057-2064. |