[1] |
Yanjun LI, Yaodong GE, Qi WANG, Weiguo ZHANG, Chen LIU.
Improved KLEIN algorithm and its quantum analysis
[J]. Journal of Computer Applications, 2024, 44(9): 2810-2817.
|
[2] |
Tingwei CHEN, Jiacheng ZHANG, Junlu WANG.
Random validation blockchain construction for federated learning
[J]. Journal of Computer Applications, 2024, 44(9): 2770-2776.
|
[3] |
Xiaoling SUN, Danhui WANG, Shanshan LI.
Dynamic ciphertext sorting and retrieval scheme based on blockchain
[J]. Journal of Computer Applications, 2024, 44(8): 2500-2505.
|
[4] |
Yeheng LI, Guangsheng LUO, Qianmin SU.
Logo detection algorithm based on improved YOLOv5
[J]. Journal of Computer Applications, 2024, 44(8): 2580-2587.
|
[5] |
Qianhong SHI, Yan YANG, Yongquan JIANG, Xiaocao OUYANG, Wubo FAN, Qiang CHEN, Tao JIANG, Yuan LI.
Multi-granularity abrupt change fitting network for air quality prediction
[J]. Journal of Computer Applications, 2024, 44(8): 2643-2650.
|
[6] |
He HUANG, Yu JIN.
Cloud data auditing scheme based on voting and Ethereum smart contracts
[J]. Journal of Computer Applications, 2024, 44(7): 2093-2101.
|
[7] |
Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG.
Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092.
|
[8] |
Jiao LI, Xiushan ZHANG, Yuanhang NING.
Blockchain sharding method for reducing cross-shard transaction proportion
[J]. Journal of Computer Applications, 2024, 44(6): 1889-1896.
|
[9] |
Min SUN, Qian CHENG, Xining DING.
CBAM-CGRU-SVM based malware detection method for Android
[J]. Journal of Computer Applications, 2024, 44(5): 1539-1545.
|
[10] |
Fan MENG, Qunli YANG, Jing HUO, Xinkuan WANG.
EraseMTS: iterative active multivariable time series anomaly detection algorithm based on margin anomaly candidate set
[J]. Journal of Computer Applications, 2024, 44(5): 1458-1463.
|
[11] |
Lipeng ZHAO, Bing GUO.
Blockchain consensus improvement algorithm based on BDLS
[J]. Journal of Computer Applications, 2024, 44(4): 1139-1147.
|
[12] |
Bin XIAO, Yun GAN, Min WANG, Xingpeng ZHANG, Zhaoxing WANG.
Network abnormal traffic detection based on port attention and convolutional block attention module
[J]. Journal of Computer Applications, 2024, 44(4): 1027-1034.
|
[13] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[14] |
Yang LIU, Rong LIU, Ke FANG, Xinyue ZHANG, Guangxu WANG.
Video super-resolution reconstruction network based on frame straddling optical flow
[J]. Journal of Computer Applications, 2024, 44(4): 1277-1284.
|
[15] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|