[1] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[2] |
Shumin TANG, Yu JIN.
Consensus mechanism of voting scheme in blockchain based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2023, 43(2): 458-466.
|
[3] |
Hongliang TIAN, Ping GE, Mingjie XIAN.
Distribution network operation exception management mechanism based on blockchain
[J]. Journal of Computer Applications, 2023, 43(11): 3504-3509.
|
[4] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[5] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[6] |
QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao.
Blockchain storage expansion model based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2021, 41(7): 1977-1982.
|
[7] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[8] |
XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai.
Public welfare time bank system based on blockchain technology
[J]. Journal of Computer Applications, 2019, 39(7): 2156-2161.
|
[9] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[10] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[11] |
LI Zhaobin, LI Weilong, WEI Zhanzhen, LIU Mengtian.
Research and implementation of key module of data security processing mechanism in software defined network
[J]. Journal of Computer Applications, 2018, 38(7): 1929-1935.
|
[12] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|
[13] |
KE Yan, ZHANG Minqing, LIU Jia, YANG Xiaoyuan.
Overview on reversible data hiding in encrypted domain
[J]. Journal of Computer Applications, 2016, 36(11): 3067-3076.
|
[14] |
KE Yan, ZHANG Minqing, LIU Jia.
Separable reversible Hexadecimal data hiding in encrypted domain
[J]. Journal of Computer Applications, 2016, 36(11): 3082-3087.
|
[15] |
YUAN Qizhao, CAI Hongliang, ZHANG Jingzhong, XIA Hangyu.
Secret sharing scheme only needing XOR operations
[J]. Journal of Computer Applications, 2015, 35(7): 1877-1881.
|