[1] |
Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO.
Application of improved hunter-prey optimization algorithm in WSN coverage
[J]. Journal of Computer Applications, 2024, 44(8): 2506-2513.
|
[2] |
Han SHEN, Zhongsheng WANG, Zhou ZHOU, Changyuan WANG.
Improved DV-Hop localization model based on multi-scenario
[J]. Journal of Computer Applications, 2024, 44(4): 1219-1227.
|
[3] |
Dahai LI, Meixin ZHAN, Zhendong WANG.
Enhanced sparrow search algorithm based on multiple improvement strategies
[J]. Journal of Computer Applications, 2023, 43(9): 2845-2854.
|
[4] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[5] |
Hongliang TIAN, Ping GE, Mingjie XIAN.
Distribution network operation exception management mechanism based on blockchain
[J]. Journal of Computer Applications, 2023, 43(11): 3504-3509.
|
[6] |
Zhe WANG, Qiming WANG, Taoshen LI, Lina GE.
Joint optimization method for SWIPT edge network based on deep reinforcement learning
[J]. Journal of Computer Applications, 2023, 43(11): 3540-3550.
|
[7] |
LIU Yongmin, YANG Yujin, LUO Haoyi, HUANG Hao, XIE Tieqiang.
Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 160-168.
|
[8] |
Hongliang TIAN, Jiayue WANG, Chenxi LI.
Data storage scheme based on hybrid algorithm blockchain and node identity authentication
[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
|
[9] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[10] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[11] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[12] |
SUN Huan, CHEN Hongbin.
Node redeployment strategy based on firefly algorithm for wireless sensor network
[J]. Journal of Computer Applications, 2021, 41(2): 492-497.
|
[13] |
HU Runyan, LI Cuiran.
Clustering algorithm of energy harvesting wireless sensor network based on fuzzy control
[J]. Journal of Computer Applications, 2020, 40(9): 2691-2697.
|
[14] |
HAN Yulao, FANG Dingyi.
Lightweight coverage hole detection algorithm based on relative position of link intersections
[J]. Journal of Computer Applications, 2020, 40(9): 2698-2705.
|
[15] |
LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke.
Outlier node detection algorithm in wireless sensor networks based ongraph signal processing
[J]. Journal of Computer Applications, 2020, 40(3): 783-787.
|