[1] |
Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG.
Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092.
|
[2] |
Xiaoyan ZHAO, Yan KUANG, Menghan WANG, Peiyan YUAN.
Device-to-device content sharing mechanism based on knowledge graph
[J]. Journal of Computer Applications, 2024, 44(4): 995-1001.
|
[3] |
Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI.
Incentive mechanism for federated learning based on generative adversarial network
[J]. Journal of Computer Applications, 2024, 44(2): 344-352.
|
[4] |
Xiaoyu DU, Shuaiqi LIU, Zhijie HAN, Zhenxiang HUO, Yujing WANG.
Patient-centric medical information sharing scheme based on IPFS and blockchain
[J]. Journal of Computer Applications, 2024, 44(10): 3122-3133.
|
[5] |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG.
Multi-organization collaborative data sharing scheme with dual authorization
[J]. Journal of Computer Applications, 2024, 44(10): 3307-3314.
|
[6] |
Xiaobing WANG, Xiongwei ZHANG, Tieyong CAO, Yunfei ZHENG, Yong WANG.
Self-distillation object segmentation method via scale-attention knowledge transfer
[J]. Journal of Computer Applications, 2024, 44(1): 129-137.
|
[7] |
Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI.
Hierarchical access control and sharing system of medical data based on blockchain
[J]. Journal of Computer Applications, 2023, 43(5): 1518-1526.
|
[8] |
Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG.
Medical image privacy protection based on thumbnail encryption and distributed storage
[J]. Journal of Computer Applications, 2023, 43(10): 3149-3155.
|
[9] |
ZHENG Wanbo, CHEN Huimin, WU Yanqing, XIA Yunni.
Simulation of information sharing strategy based on emergency rescue
[J]. Journal of Computer Applications, 2023, 43(1): 306-311.
|
[10] |
Hongliang LI, Nong ZHANG, Ting SUN, Xiang LI.
Performance interference analysis and prediction for distributed machine learning jobs
[J]. Journal of Computer Applications, 2022, 42(6): 1649-1655.
|
[11] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[12] |
Ying CHEN, Jiong YU, Jiaying CHEN, Xusheng DU.
Cross-layer data sharing based multi-task model
[J]. Journal of Computer Applications, 2022, 42(5): 1447-1454.
|
[13] |
Shoulong JIAO, Youxiang DUAN, Qifeng SUN, Zihao ZHUANG, Chenhao SUN.
Knowledge representation learning method incorporating entity description information and neighbor node features
[J]. Journal of Computer Applications, 2022, 42(4): 1050-1056.
|
[14] |
Xiaohui LI, Hongbin DONG.
Modeling and optimization method of ride-sharing matching based on E-CARGO model
[J]. Journal of Computer Applications, 2022, 42(3): 778-782.
|
[15] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|