[1] |
Jianyang CUI, Ying CAI, Yu ZHANG, Yanfang FAN.
Authenticatable privacy-preserving scheme based on signcryption from lattice for vehicular ad hoc network
[J]. Journal of Computer Applications, 2024, 44(1): 233-241.
|
[2] |
Jing ZHANG, He TIAN, Kun XIONG, Yongli TANG, Li YANG.
Fair multi-party private set intersection protocol based on cloud server
[J]. Journal of Computer Applications, 2023, 43(9): 2806-2811.
|
[3] |
Mengjie LAN, Jianping CAI, Lan SUN.
Self-regularization optimization methods for Non-IID data in federated learning
[J]. Journal of Computer Applications, 2023, 43(7): 2073-2081.
|
[4] |
Wanzhen CHEN, En ZHANG, Leiyong QIN, Shuangxi HONG.
Privacy-preserving federated learning algorithm based on blockchain in edge computing
[J]. Journal of Computer Applications, 2023, 43(7): 2209-2216.
|
[5] |
Luyu CHEN, Xiaofeng MA, Jing HE, Shengzhi GONG, Jian GAO.
Blockchain smart contract privacy authorization method based on TrustZone
[J]. Journal of Computer Applications, 2023, 43(6): 1969-1978.
|
[6] |
Teng WANG, Zheng HUO, Yaxin HUANG, Yilin FAN.
Review on privacy-preserving technologies in federated learning
[J]. Journal of Computer Applications, 2023, 43(2): 437-449.
|
[7] |
Guishuang XU, Xinchun YIN.
Certificateless conditional privacy-preserving authentication scheme for VANET
[J]. Journal of Computer Applications, 2023, 43(11): 3358-3367.
|
[8] |
Yang ZHONG, Renwan BI, Xishan YAN, Zuobin YING, Jinbo XIONG.
Efficient homomorphic neural network supporting privacy-preserving training
[J]. Journal of Computer Applications, 2022, 42(12): 3792-3800.
|
[9] |
Jialiang HAN, Yudong HAN, Xuanzhe LIU, Yaoshuai ZHAO, Di FENG.
Personalized recommendation service system based on cloud-client-convergence
[J]. Journal of Computer Applications, 2022, 42(11): 3506-3512.
|
[10] |
ZHANG Lihua, WANG Xinyi, HU Fangzhou, HUANG Yang, BAI Jiayi.
Data sharing model of smart grid based on double consortium blockchains
[J]. Journal of Computer Applications, 2021, 41(4): 963-969.
|
[11] |
ZHANG En, LI Huimin, CHANG Jian.
Verifiable k-means clustering scheme with privacy-preserving
[J]. Journal of Computer Applications, 2021, 41(2): 413-421.
|
[12] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[13] |
MA Minyao, LIU Zhuo, XU Yi, WU Lian.
Private-preserving determination problem of integer-interval positional relationship
[J]. Journal of Computer Applications, 2020, 40(9): 2657-2664.
|
[14] |
MA Minyao, WU Lian, LIU Zhuo, XU Yi.
Privacy-preserving determination of integer point-interval relationship
[J]. Journal of Computer Applications, 2020, 40(7): 1983-1988.
|
[15] |
LI Zhen, YAO Hanbing, MU Yicheng.
Secure ranked search scheme based on Simhash over encrypted data
[J]. Journal of Computer Applications, 2019, 39(9): 2623-2628.
|