| [1] |
Kaiguang MA, Xuebin CHEN, Yinlong JIAN, Liu WANG, Yuan GAO.
Network intrusion detection based on hybrid sequence model and federated class balance algorithm
[J]. Journal of Computer Applications, 2026, 46(3): 857-866.
|
| [2] |
Huan PING, Zhanguo XIA, Sicheng LIU, Qihan LIU, Chunlei LI.
Terminal data privacy-preserving scheme based on hierarchical federated learning
[J]. Journal of Computer Applications, 2026, 46(3): 830-838.
|
| [3] |
Lei WANG, Wenxuan ZHOU, Ninghui JIA, Zhihao QU.
Federated learning with two-pass communication compression for privacy-sensitive IoT data
[J]. Journal of Computer Applications, 2026, 46(3): 887-898.
|
| [4] |
Lili HE, Xinru GUAN, Lei ZHANG, Sheng JIANG, Chengjie JIANG.
Panorama and future of location privacy protection in internet of vehicles
[J]. Journal of Computer Applications, 2026, 46(3): 809-820.
|
| [5] |
Na FAN, Chuang LUO, Zehui ZHANG, Mengyao ZHANG, Ding MU.
Semantic privacy protection mechanism of vehicle trajectory based on improved generative adversarial network
[J]. Journal of Computer Applications, 2026, 46(1): 169-180.
|
| [6] |
Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU.
Blockchain-based identity management system for internet of things
[J]. Journal of Computer Applications, 2025, 45(9): 2873-2881.
|
| [7] |
Bohan ZHANG, Le LYU, Junchang JING, Dong LIU.
Genetic algorithm-based community hiding method in attribute networks
[J]. Journal of Computer Applications, 2025, 45(9): 2817-2826.
|
| [8] |
Jintao SU, Lina GE, Liguang XIAO, Jing ZOU, Zhe WANG.
Detection and defense scheme for backdoor attacks in federated learning
[J]. Journal of Computer Applications, 2025, 45(8): 2399-2408.
|
| [9] |
Lina GE, Mingyu WANG, Lei TIAN.
Review of research on efficiency of federated learning
[J]. Journal of Computer Applications, 2025, 45(8): 2387-2398.
|
| [10] |
Yan YAN, Feifei LI, Yaqin LYU, Tao FENG.
Secure and efficient frequency estimation method based on shuffled differential privacy
[J]. Journal of Computer Applications, 2025, 45(8): 2600-2611.
|
| [11] |
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI.
Privacy protection method for consortium blockchain based on SM2 linkable ring signature
[J]. Journal of Computer Applications, 2025, 45(5): 1564-1572.
|
| [12] |
Qiang LI, Shaoxiong BAI, Yuan XIONG, Wei YUAN.
Privacy preserving localization of surveillance images based on large vision models
[J]. Journal of Computer Applications, 2025, 45(3): 832-839.
|
| [13] |
Baoyin WANG, Hongmei XUE, Qilie LIU, Tao GUO.
Privacy-preserving random consensus asset cross-chain scheme
[J]. Journal of Computer Applications, 2025, 45(2): 497-505.
|
| [14] |
Bimang SUN, Wunan WAN, Shibin ZHANG, Jinquan ZHANG.
Multi-domain access control scheme in blockchain based on SM2 homomorphic encryption
[J]. Journal of Computer Applications, 2025, 45(11): 3432-3439.
|
| [15] |
Jian YUN, Xinru GAO, Tao LIU, Wenjie BI.
New federated learning scheme balancing efficiency and security
[J]. Journal of Computer Applications, 2025, 45(11): 3510-3518.
|