[1] |
Runlian ZHANG, Mi ZHANG, Xiaonian WU, Rui SHU.
Differential property evaluation method based on GPU for large-state cryptographic S-boxes
[J]. Journal of Computer Applications, 2024, 44(9): 2785-2790.
|
[2] |
Yanjun LI, Yaodong GE, Qi WANG, Weiguo ZHANG, Chen LIU.
Improved KLEIN algorithm and its quantum analysis
[J]. Journal of Computer Applications, 2024, 44(9): 2810-2817.
|
[3] |
Zhi ZHANG, Xin LI, Naifu YE, Kaixi HU.
DKP: defending against model stealing attacks based on dark knowledge protection
[J]. Journal of Computer Applications, 2024, 44(7): 2080-2086.
|
[4] |
Xiang LIN, Biao JIN, Weijing YOU, Zhiqiang YAO, Jinbo XIONG.
Model integrity verification framework of deep neural network based on fragile fingerprint
[J]. Journal of Computer Applications, 2024, 44(11): 3479-3486.
|
[5] |
Qiang WANG, Xiaoming HUANG, Qiang TONG, Xiulei LIU.
Weakly supervised salient object detection algorithm based on bounding box annotation
[J]. Journal of Computer Applications, 2023, 43(6): 1910-1918.
|
[6] |
Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG.
Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model
[J]. Journal of Computer Applications, 2023, 43(5): 1504-1510.
|
[7] |
Ronghao LUO, Zhiyou CHENG, Chuanjian WANG, Siqian LIU, Zhentian WANG.
Anesthesia resuscitation object detection method based on improved single shot multibox detector
[J]. Journal of Computer Applications, 2023, 43(12): 3941-3946.
|
[8] |
Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU.
SM4 resistant differential power analysis lightweight threshold implementation
[J]. Journal of Computer Applications, 2023, 43(11): 3490-3496.
|
[9] |
Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI.
Design and implementation of cipher component security criteria testing tool
[J]. Journal of Computer Applications, 2023, 43(10): 3156-3161.
|
[10] |
SUN Zeqiang, CHEN Bingcai, CUI Xiaobo, WANG Lei, LU Yanuo.
Strip steel surface defect detection by YOLOv5 algorithm fusing frequency domain attention mechanism and decoupled head
[J]. Journal of Computer Applications, 2023, 43(1): 242-249.
|
[11] |
Jiaxuan WEI, Shikang DU, Zhixuan YU, Ruisheng ZHANG.
Review of white-box adversarial attack technologies in image classification
[J]. Journal of Computer Applications, 2022, 42(9): 2732-2741.
|
[12] |
Jingwen CAI, Yongzhuang WEI, Zhenghong LIU.
GPU-based method for evaluating algebraic properties of cryptographic S-boxes
[J]. Journal of Computer Applications, 2022, 42(9): 2750-2756.
|
[13] |
Bo YANG, Hengwei ZHANG, Zheming LI, Kaiyong XU.
Adversarial example generation method based on image flipping transform
[J]. Journal of Computer Applications, 2022, 42(8): 2319-2325.
|
[14] |
Jingwen WU, Xinchun YIN, Jianting NING.
Traceable and revocable multi-authority attribute-based encryption scheme for vehicular ad hoc networks
[J]. Journal of Computer Applications, 2022, 42(6): 1695-1701.
|
[15] |
Geng ZHAO, Senmin ZHANG, Yingjie MA, Shirui GAO.
Design and analysis of dynamic S-box based on anti-degradation chaotic system
[J]. Journal of Computer Applications, 2022, 42(10): 3069-3073.
|