[1] |
Zhizheng ZHANG, Xiaojian ZHANG, Junqing WANG, Guanghui FENG.
Federated spatial data publication method with differential privacy and secure aggregation
[J]. Journal of Computer Applications, 2024, 44(9): 2777-2784.
|
[2] |
Tingwei CHEN, Jiacheng ZHANG, Junlu WANG.
Random validation blockchain construction for federated learning
[J]. Journal of Computer Applications, 2024, 44(9): 2770-2776.
|
[3] |
Xudong LI, Yukang FENG, Junsheng CHEN.
Multi-key page-level encryption system for SQLite
[J]. Journal of Computer Applications, 2024, 44(9): 2791-2801.
|
[4] |
Haoyu ZHAO, Ziqiang YU, Xiaomeng CHEN, Guoxiang CHEN, Hui ZHU, Bohan LI.
Top-K optimal route query problem with keyword search support
[J]. Journal of Computer Applications, 2024, 44(8): 2455-2465.
|
[5] |
Xiaoling SUN, Danhui WANG, Shanshan LI.
Dynamic ciphertext sorting and retrieval scheme based on blockchain
[J]. Journal of Computer Applications, 2024, 44(8): 2500-2505.
|
[6] |
Guiyong LI, Bin HE, Lei FANG.
Key generation algorithm based on cyclic grouping of difference thresholds
[J]. Journal of Computer Applications, 2024, 44(7): 2110-2115.
|
[7] |
Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG.
Review on security threats and defense measures in federated learning
[J]. Journal of Computer Applications, 2024, 44(6): 1663-1672.
|
[8] |
Yaxing BING, Yangping WANG, Jiu YONG, Haomou BAI.
Six degrees of freedom object pose estimation algorithm based on filter learning network
[J]. Journal of Computer Applications, 2024, 44(6): 1920-1926.
|
[9] |
Dongju YANG, Chengfu HU.
Keyword extraction method for scientific text based on improved TextRank
[J]. Journal of Computer Applications, 2024, 44(6): 1720-1726.
|
[10] |
Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG.
Efficient reversible data hiding scheme based on two-dimensional modulo operations
[J]. Journal of Computer Applications, 2024, 44(6): 1880-1888.
|
[11] |
Wei LUO, Jinquan LIU, Zheng ZHANG.
Dual vertical federated learning framework incorporating secret sharing technology
[J]. Journal of Computer Applications, 2024, 44(6): 1872-1879.
|
[12] |
Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG.
Location privacy protection algorithm based on trajectory perturbation and road network matching
[J]. Journal of Computer Applications, 2024, 44(5): 1546-1554.
|
[13] |
Yanjun LI, Xiaoyu JING, Huiqin XIE, Yong XIANG.
Security analysis of PFP algorithm under quantum computing model
[J]. Journal of Computer Applications, 2024, 44(4): 1166-1171.
|
[14] |
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Analysis of consistency between sensitive behavior and privacy policy of Android applications
[J]. Journal of Computer Applications, 2024, 44(3): 788-796.
|
[15] |
Xinyuan YIN, Xiaojian ZHENG, Jinbo XIONG.
Two-round three-party password-authenticated key exchange protocol over lattices without non-interactive zero-knowledge proof
[J]. Journal of Computer Applications, 2024, 44(3): 805-810.
|