[1] |
Yi ZHOU, Hua GAO, Yongshen TIAN.
Proximal policy optimization algorithm based on clipping optimization and policy guidance
[J]. Journal of Computer Applications, 2024, 44(8): 2334-2341.
|
[2] |
Wei LI, Xiaorong ZHANG, Peng CHEN, Qing LI, Changqing ZHANG.
Crowd counting algorithm with multi-scale fusion based on normal inverse Gamma distribution
[J]. Journal of Computer Applications, 2024, 44(7): 2243-2249.
|
[3] |
Tingting LI, Junfeng CHU, Yanyan WANG.
Group recommendation method based on implicit trust and group consensus
[J]. Journal of Computer Applications, 2024, 44(2): 460-468.
|
[4] |
Luyu CHEN, Xiaofeng MA, Jing HE, Shengzhi GONG, Jian GAO.
Blockchain smart contract privacy authorization method based on TrustZone
[J]. Journal of Computer Applications, 2023, 43(6): 1969-1978.
|
[5] |
Xingshen WEI, Peng GAO, Zhuo LYU, Yongjian CAO, Jian ZHOU, Zhihao QU.
Adaptive interaction feedback based trust evaluation mechanism for power terminals
[J]. Journal of Computer Applications, 2023, 43(6): 1878-1883.
|
[6] |
Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA.
Review of zero trust network and its key technologies
[J]. Journal of Computer Applications, 2023, 43(4): 1142-1150.
|
[7] |
Zhenjie XIE, Wei FU.
Error replica recovery mechanism for cloud storage based on auditable multiple replicas
[J]. Journal of Computer Applications, 2023, 43(4): 1102-1108.
|
[8] |
Wenshuai SONG, Miaolei DENG, Mimi MA, Haochen LI.
Research progress in public-key encryption with keyword search
[J]. Journal of Computer Applications, 2023, 43(3): 794-803.
|
[9] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[10] |
Yicong LIU, Junfeng CHU, Yanyan WANG, Yingming WANG.
TODIM group decision-making method under trust network
[J]. Journal of Computer Applications, 2022, 42(8): 2369-2377.
|
[11] |
Wei LI, Qunqun WU, Yiwen ZHANG.
Developer recommendation method based on E-CARGO model
[J]. Journal of Computer Applications, 2022, 42(2): 557-564.
|
[12] |
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG.
Trusted integrity verification scheme of cloud data without bilinear pairings
[J]. Journal of Computer Applications, 2022, 42(12): 3769-3774.
|
[13] |
Yinying ZHOU, Mengyi ZHANG, Dunhui YU, Ming ZHU.
Social recommendation combining trust implicit similarity and score similarity
[J]. Journal of Computer Applications, 2022, 42(12): 3671-3678.
|
[14] |
XIAO Yuelei, DENG Xiaofan.
Improvement and analysis of certificate-based wired local area network security association scheme
[J]. Journal of Computer Applications, 2021, 41(7): 1970-1976.
|
[15] |
ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang.
Data trading scheme based on blockchain and trusted computing
[J]. Journal of Computer Applications, 2021, 41(4): 939-944.
|