[1] |
Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO.
Application of improved hunter-prey optimization algorithm in WSN coverage
[J]. Journal of Computer Applications, 2024, 44(8): 2506-2513.
|
[2] |
Han SHEN, Zhongsheng WANG, Zhou ZHOU, Changyuan WANG.
Improved DV-Hop localization model based on multi-scenario
[J]. Journal of Computer Applications, 2024, 44(4): 1219-1227.
|
[3] |
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI.
Review of blockchain lightweight technology applied to internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3688-3698.
|
[4] |
Kedi NIU, Min LI, Zhongyuan YAO, Xueming SI.
Review of blockchain consensus algorithms for internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3678-3687.
|
[5] |
Yicheng WAN, Guangxiang YANG, Qingda ZHANG, Chenyang GAN, Lin YI.
Impact of non-persistent carrier sense multiple access mechanism on scalability of LoRa networks
[J]. Journal of Computer Applications, 2023, 43(9): 2885-2896.
|
[6] |
Dahai LI, Meixin ZHAN, Zhendong WANG.
Enhanced sparrow search algorithm based on multiple improvement strategies
[J]. Journal of Computer Applications, 2023, 43(9): 2845-2854.
|
[7] |
Zhe WANG, Qiming WANG, Taoshen LI, Lina GE.
Joint optimization method for SWIPT edge network based on deep reinforcement learning
[J]. Journal of Computer Applications, 2023, 43(11): 3540-3550.
|
[8] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[9] |
Hongliang TIAN, Jiayue WANG, Chenxi LI.
Data storage scheme based on hybrid algorithm blockchain and node identity authentication
[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
|
[10] |
Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG.
Data management method for building internet of things based on Hashgraph
[J]. Journal of Computer Applications, 2022, 42(8): 2471-2480.
|
[11] |
Hongqiu LUO, Shengbo HU.
Data naming mechanism of low earth orbit satellite mega-constellation for internet of things
[J]. Journal of Computer Applications, 2022, 42(7): 2146-2154.
|
[12] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[13] |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG.
Intrusion detection system with dynamic weight loss function based on internet of things platform
[J]. Journal of Computer Applications, 2022, 42(7): 2118-2124.
|
[14] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[15] |
Xin ZHENG, Suyue LI, Anhong WANG, Meiling LI, Sami MUHAIDAT, Aiping NING.
Ergodic rate analysis of cooperative multiple input multiple output ambient backscatter communication system
[J]. Journal of Computer Applications, 2022, 42(3): 974-979.
|