[1] |
Xiaonian WU, Jing KUANG, Runlian ZHANG, Lingchen LI.
SAT-based impossible differential cryptanalysis of GRANULE cipher
[J]. Journal of Computer Applications, 2024, 44(3): 797-804.
|
[2] |
Chao WANG, Shanshan YAO.
Speaker verification method based on speech quality adaptation and triplet-like idea
[J]. Journal of Computer Applications, 2024, 44(12): 3899-3906.
|
[3] |
Qi WANG, Hang LEI, Xupeng WANG.
Deep face verification under pose interference
[J]. Journal of Computer Applications, 2023, 43(2): 595-600.
|
[4] |
Tao QIU, Jianli DING, Xiufeng XIA, Hongmei XI, Peiliang XIE, Qingyi ZHOU.
Efficient complex event matching algorithm based on ordered event lists
[J]. Journal of Computer Applications, 2023, 43(2): 423-429.
|
[5] |
Yulian ZHANG, Shanshan YAO, Chao WANG, Jiang CHANG.
Text-independent speaker verification method based on uncertainty learning
[J]. Journal of Computer Applications, 2023, 43(12): 3727-3732.
|
[6] |
Wei LIU, Cong ZHANG, Wei SHE, Xuan SONG, Zhao TIAN.
Data trusted traceability method based on Merkle mountain range
[J]. Journal of Computer Applications, 2022, 42(9): 2765-2771.
|
[7] |
Wang TAN, Yi LI.
Synthesis of loop bound functions for loop programs
[J]. Journal of Computer Applications, 2022, 42(2): 565-573.
|
[8] |
Bin ZHANG, Li WANG, Yanjie YANG.
Process tracking multi‑task rumor verification model combined with stance
[J]. Journal of Computer Applications, 2022, 42(11): 3371-3378.
|
[9] |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG.
Blockchain-based data frame security verification mechanism in software defined network
[J]. Journal of Computer Applications, 2022, 42(10): 3074-3083.
|
[10] |
WU Kaifan, YIN Xinchun.
Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system
[J]. Journal of Computer Applications, 2021, 41(6): 1621-1630.
|
[11] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[12] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[13] |
ZHANG Linghao, WANG Sheng, ZHOU Hui, CHEN Yifan, GUI Shenglin.
Secure communication scheme of unmanned aerial vehicle system based on MAVLink protocol
[J]. Journal of Computer Applications, 2020, 40(8): 2286-2292.
|
[14] |
PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun.
Design and implementation of Lite register model
[J]. Journal of Computer Applications, 2020, 40(5): 1369-1373.
|
[15] |
QIN Biao, GUO Fan, TU Fengtao.
Correctness verification of static taint analysis results for Android application
[J]. Journal of Computer Applications, 2019, 39(10): 3018-3027.
|