[1] |
Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG.
Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092.
|
[2] |
Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG.
Efficient reversible data hiding scheme based on two-dimensional modulo operations
[J]. Journal of Computer Applications, 2024, 44(6): 1880-1888.
|
[3] |
Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG.
Review on security threats and defense measures in federated learning
[J]. Journal of Computer Applications, 2024, 44(6): 1663-1672.
|
[4] |
Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG.
Location privacy protection algorithm based on trajectory perturbation and road network matching
[J]. Journal of Computer Applications, 2024, 44(5): 1546-1554.
|
[5] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[6] |
Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO.
Attribute-based encryption scheme for blockchain privacy protection
[J]. Journal of Computer Applications, 2024, 44(2): 485-489.
|
[7] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
[8] |
Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Traceability storage model of charity system oriented to master-slave chain
[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758.
|
[9] |
Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG.
Development, technologies and applications of blockchain 3.0
[J]. Journal of Computer Applications, 2024, 44(12): 3647-3657.
|
[10] |
Rui GAO, Xuebin CHEN, Zucuan ZHANG.
Dynamic social network privacy publishing method for partial graph updating
[J]. Journal of Computer Applications, 2024, 44(12): 3831-3838.
|
[11] |
Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG.
Progress and prospect of zero-knowledge proof enabling blockchain
[J]. Journal of Computer Applications, 2024, 44(12): 3669-3677.
|
[12] |
Yifan WANG, Shaofu LIN, Yunjiang LI.
Highway free-flow tolling method based on blockchain and zero-knowledge proof
[J]. Journal of Computer Applications, 2024, 44(12): 3741-3750.
|
[13] |
Xuebin CHEN, Changsheng QU.
Overview of backdoor attacks and defense in federated learning
[J]. Journal of Computer Applications, 2024, 44(11): 3459-3469.
|
[14] |
Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE.
Deep shadow defense scheme of federated learning based on generative adversarial network
[J]. Journal of Computer Applications, 2024, 44(1): 223-232.
|
[15] |
Shuo HUANG, Yanhui LI, Jianqiu CAO.
PrivSPM: frequent sequential pattern mining algorithm under local differential privacy
[J]. Journal of Computer Applications, 2023, 43(7): 2057-2064.
|