[1] |
Teng WANG, Zheng HUO, Yaxin HUANG, Yilin FAN.
Review on privacy-preserving technologies in federated learning
[J]. Journal of Computer Applications, 2023, 43(2): 437-449.
|
[2] |
Guozhong LI, Ya CUI, Yixin EMU, Ling HE, Yuanyuan LI, Xi XIONG.
Automatic detection algorithm for attention deficit/hyperactivity disorder based on speech pause and flatness
[J]. Journal of Computer Applications, 2022, 42(9): 2917-2925.
|
[3] |
Kaiwang ZHANG, Fei HUI, Guoxiang ZHANG, Qi SHI, Zhizhong LIU.
Car-following model of intelligent connected vehicles based on time-delayed velocity difference and velocity limit
[J]. Journal of Computer Applications, 2022, 42(9): 2936-2942.
|
[4] |
Xuling ZENG, Taoshen LI, Jian GONG, Lijun DU.
Secure offloading optimization of wireless powered mobile edge computing system
[J]. Journal of Computer Applications, 2022, 42(4): 1216-1224.
|
[5] |
Dan HE, Xiping HE, Yue LI, Rui YUAN, Yuanyuan NIU.
Face anti-spoofing method based on regional blocking and lightweight network
[J]. Journal of Computer Applications, 2022, 42(12): 3708-3714.
|
[6] |
Chuyu JIANG, Lixi FANG, Ning ZHANG, Jianming ZHU.
Cross-chain interaction safety model based on notary groups
[J]. Journal of Computer Applications, 2022, 42(11): 3438-3443.
|
[7] |
Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG.
High-capacity reversible data hiding in encrypted videos based on histogram shifting
[J]. Journal of Computer Applications, 2022, 42(11): 3633-3638.
|
[8] |
WANG Shuyan, HOU Zeyu, SUN Jiaze.
Difference detection method of adversarial samples oriented to deep learning
[J]. Journal of Computer Applications, 2021, 41(7): 1849-1856.
|
[9] |
GUO Shuai, SU Yang.
Encrypted traffic classification method based on data stream
[J]. Journal of Computer Applications, 2021, 41(5): 1386-1391.
|
[10] |
DU Zhiqiang, ZHENG Dong, ZHAO Qinglan.
Verifiable and secure outsourcing for large matrix full rank decomposition
[J]. Journal of Computer Applications, 2021, 41(5): 1367-1371.
|
[11] |
ZHANG Lihua, WANG Xinyi, HU Fangzhou, HUANG Yang, BAI Jiayi.
Data sharing model of smart grid based on double consortium blockchains
[J]. Journal of Computer Applications, 2021, 41(4): 963-969.
|
[12] |
HOU Yunlong, ZHU Lei, CHEN Qin, LYU Suidong.
Salient object detection based on difference of Gaussian feature network
[J]. Journal of Computer Applications, 2021, 41(3): 706-713.
|
[13] |
SHE Yulong, ZHANG Xiaolong, CHENG Ruoqin, DENG Chunhua.
Semantic segmentation method based on edge attention model
[J]. Journal of Computer Applications, 2021, 41(2): 343-349.
|
[14] |
ZHANG En, LI Huimin, CHANG Jian.
Verifiable k-means clustering scheme with privacy-preserving
[J]. Journal of Computer Applications, 2021, 41(2): 413-421.
|
[15] |
CHENG Yaling, BAI Zhi, TAN Aiping.
Multi-focus image fusion method based on guided filtering and difference image
[J]. Journal of Computer Applications, 2021, 41(1): 220-224.
|