[1] |
YUAN Heng-zhou, , SANG Hao, LIU Sheng, CHEN Xiao-wen, YAN Guang-da, GUO Yang, .
A high-precision oscillator noise analysis model of ISF based on PSS+PXF
[J]. Computer Engineering & Science, 2024, 46(06): 951-958.
|
[2] |
DONG Yan-ling , ZHANG Shu-fen, XU Jing-cheng, WANG Hao-shi, .
Research on differential privacy protection for Stacking algorithm
[J]. Computer Engineering & Science, 2024, 46(02): 244-252.
|
[3] |
WANG Hui, CHEN Yu, SHEN Zi-hao, LIU Pei-qian.
A trajectory data differential privacy protection scheme that combines contrast supervision and sorting tree
[J]. Computer Engineering & Science, 2023, 45(10): 1797-1805.
|
[4] |
LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, .
A Stacking ensemble clustering algorithm based on differential privacy protection
[J]. Computer Engineering & Science, 2022, 44(08): 1402-1408.
|
[5] |
SANG Hao, YUAN Heng-zhou, LIANG Bin, CHEN Jian-jun, GUO Yang.
Structure and phase noise of feedforward ring oscillator
[J]. Computer Engineering & Science, 2022, 44(03): 411-416.
|
[6] |
YUAN Quan, YAN Fei-yang, WEN Zhi-yun, ZHANG Zhen-kang, .
A differential privacy protection algorithm in social network based on spectral clustering
[J]. Computer Engineering & Science, 2022, 44(02): 251-256.
|
[7] |
HU Yu-gu, GE Li-na, .
An improved differential privacy parameter setting and data optimization algorithm
[J]. Computer Engineering & Science, 2021, 43(10): 1758-1765.
|
[8] |
ZHOU Wei,XIAO Yang.
A spectral clustering algorithm based on Canopy clustering
[J]. Computer Engineering & Science, 2019, 41(06): 1095-1100.
|
[9] |
FU Yuxiang1,QIN Yongbin1,2,SHEN Guowei1,2.
Multi-source data privacy protection
based on transfer learning
[J]. Computer Engineering & Science, 2019, 41(04): 641-648.
|
[10] |
REN Shengbing,LIAO Xiangdang.
Software defect prediction based on
cost-sensitive support vector machine
[J]. Computer Engineering & Science, 2018, 40(10): 1787-1795.
|
[11] |
GAO Zhiqiang,CUI Xiaolong,ZHOU Sha,YUAN Chen.
Local differential privacy protection and its applications
[J]. Computer Engineering & Science, 2018, 40(06): 1029-1036.
|
[12] |
WU Weimin,HUANG Huankun.
A DP-DBScan clustering algorithm based on
differential privacy preserving
[J]. J4, 2015, 37(04): 830-834.
|
[13] |
WANG Na1,ZHANG Jian2,WANG Jindong1,ZHANG Hengwei1.
Application research of monotonic index
space in information system risk evaluation
[J]. J4, 2015, 37(03): 486-491.
|
[14] |
CUI Liangzhong,ZHANG Zhixiang,GUO Fuliang,LIANG Yingjie.
Analysis and suggestions on the students’information
literacy cultivation in military colleges
[J]. J4, 2014, 36(A2): 16-18.
|
[15] |
NIE Peng1,2,GENG Ji1,QIN Zhiguang1.
Component-Based Web System Back-Propagation Neural Network Reliability Model
[J]. J4, 2012, 34(12): 66-73.
|