[1] |
Hong ZHAO, Shuhan YU, Yanyan HAN, Zhaobin LI.
Analysis and improvement of certificateless signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
|
[2] |
Jiaxuan WEI, Shikang DU, Zhixuan YU, Ruisheng ZHANG.
Review of white-box adversarial attack technologies in image classification
[J]. Journal of Computer Applications, 2022, 42(9): 2732-2741.
|
[3] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[4] |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG.
Blockchain-based data frame security verification mechanism in software defined network
[J]. Journal of Computer Applications, 2022, 42(10): 3074-3083.
|
[5] |
Jialiang DUAN, Guoming CAI, Kaiyong XU.
Memory combined feature classification method based on multiple BP neural networks
[J]. Journal of Computer Applications, 2022, 42(1): 178-182.
|
[6] |
XU Liyun, YAN Tao, QIAN Yuhua.
Audio encryption algorithm in fractional domain based on cascaded chaotic system
[J]. Journal of Computer Applications, 2021, 41(9): 2623-2630.
|
[7] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[8] |
SHEN Yumin, WANG Jinlong, HU Diankai, LIU Xingyu.
Multi-person collaborative creation system of building information modeling drawings based on blockchain
[J]. Journal of Computer Applications, 2021, 41(8): 2338-2345.
|
[9] |
XIAO Yuelei, DENG Xiaofan.
Improvement and analysis of certificate-based wired local area network security association scheme
[J]. Journal of Computer Applications, 2021, 41(7): 1970-1976.
|
[10] |
WANG Yue, JIANG Yiming, LAN Julong.
Intrusion detection based on improved triplet network and K-nearest neighbor algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 1996-2002.
|
[11] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[12] |
ZHANG Quanlong, WANG Huaibin.
Intrusion detection model based on combination of dilated convolution and gated recurrent unit
[J]. Journal of Computer Applications, 2021, 41(5): 1372-1377.
|
[13] |
QIN Jing, AN Wen, JI Changqing, WANG Zumin.
Review of privacy protection mechanisms in wireless body area network
[J]. Journal of Computer Applications, 2021, 41(4): 970-975.
|
[14] |
GAO Haoyu, LI Leixiao, LIN Hao, LI Jie, DENG Dan, LI Shaoxu.
Research and application progress of blockchain in area of data integrity protection
[J]. Journal of Computer Applications, 2021, 41(3): 745-755.
|
[15] |
TANG Yanqiang, LI Chenghai, SONG Yafei.
Network security situation prediction based on improved particle swarm optimization and extreme learning machine
[J]. Journal of Computer Applications, 2021, 41(3): 768-773.
|