[1] |
Qianhong SHI, Yan YANG, Yongquan JIANG, Xiaocao OUYANG, Wubo FAN, Qiang CHEN, Tao JIANG, Yuan LI.
Multi-granularity abrupt change fitting network for air quality prediction
[J]. Journal of Computer Applications, 2024, 44(8): 2643-2650.
|
[2] |
Fan MENG, Qunli YANG, Jing HUO, Xinkuan WANG.
EraseMTS: iterative active multivariable time series anomaly detection algorithm based on margin anomaly candidate set
[J]. Journal of Computer Applications, 2024, 44(5): 1458-1463.
|
[3] |
Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN.
MAC layer scheduling strategy of roadside units based on MEC server priority service
[J]. Journal of Computer Applications, 2024, 44(4): 1227-1235.
|
[4] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[5] |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG.
Multi-organization collaborative data sharing scheme with dual authorization
[J]. Journal of Computer Applications, 2024, 44(10): 3307-3314.
|
[6] |
Yuhao TANG, Dezhong PENG, Zhong YUAN.
Fuzzy multi-granularity anomaly detection for incomplete mixed data
[J]. Journal of Computer Applications, 2024, 44(10): 3097-3104.
|
[7] |
Haiying MA, Jinzhou LI, Jikun YANG.
Blockchain-based decentralized attribute-based encryption scheme for revocable attributes
[J]. Journal of Computer Applications, 2023, 43(9): 2789-2797.
|
[8] |
Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI.
Hierarchical access control and sharing system of medical data based on blockchain
[J]. Journal of Computer Applications, 2023, 43(5): 1518-1526.
|
[9] |
Xiaoyan ZHANG, Jiayi WANG.
Comparison of three-way concepts under attribute clustering
[J]. Journal of Computer Applications, 2023, 43(5): 1336-1341.
|
[10] |
YAO Huayong, YE Dongyi, CHEN Zhaojiong.
Multi-round conversational reinforcement learning recommendation algorithm via multi-granularity feedback
[J]. Journal of Computer Applications, 2023, 43(1): 15-21.
|
[11] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[12] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[13] |
Jun HU, Zhengkang XU, Li LIU, Fujin ZHONG.
Network embedding method based on multi-granularity community information
[J]. Journal of Computer Applications, 2022, 42(3): 663-670.
|
[14] |
GE Jihong, SHEN Tao.
Energy data access control method based on blockchain
[J]. Journal of Computer Applications, 2021, 41(9): 2615-2622.
|
[15] |
MENG Fan, CHEN Guang, WANG Yong, GAO Yang, GAO Dequn, JIA Wenlong.
Multi-granularity temporal structure representation based outlier detection method for prediction of oil reservoir
[J]. Journal of Computer Applications, 2021, 41(8): 2453-2459.
|