[1] |
WANG Lei, LIU Ran-ran.
An EDAS decision making method and its application based on a novel picture fuzzy distance
[J]. Computer Engineering & Science, 2024, 46(06): 1101-1111.
|
[2] |
CHU Xu, NING Ai-bing, HU Kai-yuan, DAI Su-yu, ZHANG Hui-zhen.
A backtracking algorithm with reduction for the threshold-minimum dominating set problem
[J]. Computer Engineering & Science, 2024, 46(05): 897-906.
|
[3] |
ZHANG Xiao-yan, WANG Jia-yi.
Efficiency measurement of attribute granulation under the background of three-way concept
[J]. Computer Engineering & Science, 2024, 46(04): 725-733.
|
[4] |
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei.
A revocable traceable access control scheme in autonomous vehicle platoon
[J]. Computer Engineering & Science, 2024, 46(02): 232-243.
|
[5] |
XIAO Zhen-guo, CHEN Lin-shu, SUN Shao-jie, MEI Ben-xia, LIU Yuan-hui, ZHAO Lei.
A clustering method based on algebraic granularity
[J]. Computer Engineering & Science, 2024, 46(01): 150-158.
|
[6] |
ZHOU Shi-ji, TANG Xiao, ZHAO Rong-le, LIANG Yan-ling, .
An intuitionistic fuzzy three-way decision method based on perturbation dominance relationship
[J]. Computer Engineering & Science, 2023, 45(11): 2027-2035.
|
[7] |
DING Yan, WANG Peng, WANG Chuang, LI Zhi-peng, SONG Lian-tao, FENG Liao-liao.
An attribute-based dynamic mandatory access control mechanism for operating system
[J]. Computer Engineering & Science, 2023, 45(10): 1770-1778.
|
[8] |
XU Cheng-zhou, LI Lu, ZHANG Wen-tao.
An attribute-based encryption scheme supporting complex access policies
[J]. Computer Engineering & Science, 2023, 45(10): 1779-1788.
|
[9] |
HAN Hui-yan, WANG Wen-jun, HAN Xie, KUANG Li-qun, XUE Hong-xin, .
A grasp pose estimation method combining semantic instance reconstruction
[J]. Computer Engineering & Science, 2023, 45(10): 1822-1829.
|
[10] |
.
Double-Bagging based feature dimension reduction heterogenous integrated intrusion detection
[J]. Computer Engineering & Science, 2023, 45(06): 1011-1019.
|
[11] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(03): 443-452.
|
[12] |
.
A TOPSIS method based on natural language cloud and its application
[J]. Computer Engineering & Science, 2023, 45(03): 565-570.
|
[13] |
LI Tong-tong, WANG Shi-rui, ZHANG Yao-fang, WANG Bai-ling, WANG Zi-bo, LIU Hong-ri, .
Multi-dimensional attribute analysis of industrial control system vulnerability
[J]. Computer Engineering & Science, 2023, 45(02): 261-268.
|
[14] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(02): 286-294.
|
[15] |
NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen.
A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals
[J]. Computer Engineering & Science, 2022, 44(11): 1941-1950.
|