[1] |
Yanjun LI, Xiaoyu JING, Huiqin XIE, Yong XIANG.
Security analysis of PFP algorithm under quantum computing model
[J]. Journal of Computer Applications, 2024, 44(4): 1166-1171.
|
[2] |
Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE.
Differential and linear characteristic analysis of full-round Shadow algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3839-3843.
|
[3] |
Enbao QIAO, Xiangyang GAO, Jun CHENG.
Self-recovery adaptive Monte Carlo localization algorithm based on support vector machine
[J]. Journal of Computer Applications, 2024, 44(10): 3246-3251.
|
[4] |
Anyang LIU, Huaici ZHAO, Wenlong CAI, Zechao XU, Ruideng XIE.
Adaptive image deblurring generative adversarial network algorithm based on active discrimination mechanism
[J]. Journal of Computer Applications, 2023, 43(7): 2288-2294.
|
[5] |
Zhenjie XIE, Wei FU.
Error replica recovery mechanism for cloud storage based on auditable multiple replicas
[J]. Journal of Computer Applications, 2023, 43(4): 1102-1108.
|
[6] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[7] |
Yingqi LI, Weifeng JI, Jiang WENG, Xuan WU, Xiuyu SHEN, Yan SUN.
Virus propagation model and stability analysis of heterogeneous backup network
[J]. Journal of Computer Applications, 2023, 43(4): 1176-1182.
|
[8] |
Yuan GU, Zhen ZHANG, Tong DUAN.
Fast link failure recovery method for software-defined internet of vehicles
[J]. Journal of Computer Applications, 2023, 43(3): 853-859.
|
[9] |
Hongliang TIAN, Ping GE, Mingjie XIAN.
Distribution network operation exception management mechanism based on blockchain
[J]. Journal of Computer Applications, 2023, 43(11): 3504-3509.
|
[10] |
Xiaoling SUN, Shanshan LI, Guang YANG, Qiuge YANG.
Blow-CAST-Fish key recovery attack based on differential tables
[J]. Journal of Computer Applications, 2022, 42(9): 2742-2749.
|
[11] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[12] |
Jingyu LIU, Qiuxia NIU, Xiaoyan LI, Qiaoshuo SHI, Youxi WU.
Fast failure recovery method based on local redundant hybrid code
[J]. Journal of Computer Applications, 2022, 42(4): 1244-1252.
|
[13] |
Yang LIU, Yangyang ZHANG, Haoyi ZHOU.
Efficient failure recovery method for stream data processing system
[J]. Journal of Computer Applications, 2022, 42(11): 3337-3345.
|
[14] |
Anyi WANG, Heng ZHANG.
Multi-input multi-output intelligent receiver model based on multi-label classification algorithm
[J]. Journal of Computer Applications, 2022, 42(10): 3124-3129.
|
[15] |
Cong XU, Xingtian WANG, Yongpeng TAO.
Reversible data hiding method based on high-order bit-plane redundancy
[J]. Journal of Computer Applications, 2022, 42(1): 171-177.
|