[1] |
Tingwei CHEN, Jiacheng ZHANG, Junlu WANG.
Random validation blockchain construction for federated learning
[J]. Journal of Computer Applications, 2024, 44(9): 2770-2776.
|
[2] |
Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI.
Incentive mechanism for federated learning based on generative adversarial network
[J]. Journal of Computer Applications, 2024, 44(2): 344-352.
|
[3] |
Peiyao ZHANG, Xiaodong FU.
Incentive mechanism of crowdsourcing multi-task assignment against malicious bidding
[J]. Journal of Computer Applications, 2024, 44(1): 261-268.
|
[4] |
Sirui WANG, Shijuan CHENG, Feimeng YUAN.
Reliability evaluation method of high-reliability products based on improved evidence fusion
[J]. Journal of Computer Applications, 2023, 43(7): 2140-2146.
|
[5] |
Yanan PAN, Qingxian PAN, Zhaoyi YU, Jiajing CHU, Song YU.
Online incentive mechanism based on quality perception in spatio-temporal crowdsourcing
[J]. Journal of Computer Applications, 2023, 43(7): 2091-2099.
|
[6] |
Fangxing GENG, Zhuo LI, Xin CHEN.
Incentive mechanism design for hierarchical federated learning based on multi-leader Stackelberg game
[J]. Journal of Computer Applications, 2023, 43(11): 3551-3558.
|
[7] |
Hanlun LI, Jianguo REN.
Malware propagation model based on characteristic behavior detection in P2P networks
[J]. Journal of Computer Applications, 2022, 42(7): 2125-2131.
|
[8] |
Yuntao XU, Junwu ZHU, Binwen SUN, Maosheng SUN, Sihai CHEN.
Election-based supply chain: a supply chain autonomy framework based on blockchain
[J]. Journal of Computer Applications, 2022, 42(6): 1770-1775.
|
[9] |
Shengjia GONG, Linlin ZHANG, Kai ZHAO, Juntao LIU, Han YANG.
Fake news detection method based on blockchain technology
[J]. Journal of Computer Applications, 2022, 42(11): 3458-3464.
|
[10] |
LI Congdong, HUANG Hao, ZHANG Fanshun.
Knowledge sharing behavior incentive mechanism for lead users based on evolutionary game
[J]. Journal of Computer Applications, 2021, 41(6): 1785-1791.
|
[11] |
WANG Yijie, FAN Jiafei, WANG Chenyu.
Two-stage task offloading strategy based on game theory in cloud-edge environment
[J]. Journal of Computer Applications, 2021, 41(5): 1392-1398.
|
[12] |
MAO Yingchi, XU Xuesong, LIU Pengfei.
Multi-user task offloading strategy based on stable allocation
[J]. Journal of Computer Applications, 2021, 41(3): 786-793.
|
[13] |
ZHANG Shuyao, LI Yonghua, FAN Jiajia.
Bulk storage assignment algorithm in bulk port based on game theory
[J]. Journal of Computer Applications, 2021, 41(3): 867-874.
|
[14] |
Ying LEI, Wanbo ZHENG, Wei WEI, Yunni XIA, Xiaobo LI, Chengwu LIU, Hong XIE.
Task offloading method based on probabilistic performance awareness and evolutionary game strategy in “cloud + edge” hybrid environment
[J]. Journal of Computer Applications, 2021, 41(11): 3302-3308.
|
[15] |
WU Guangfu, WANG Yingjun.
Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing
[J]. Journal of Computer Applications, 2021, 41(10): 2885-2892.
|