[1] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[2] |
GUO Chen-liang, YAN Shao-hong, ZONG Chen-qi.
Research on parallel acceleration of line cloud privacy attack algorithm
[J]. Computer Engineering & Science, 2024, 46(04): 615-625.
|
[3] |
DONG Yan-ling , ZHANG Shu-fen, XU Jing-cheng, WANG Hao-shi, .
Research on differential privacy protection for Stacking algorithm
[J]. Computer Engineering & Science, 2024, 46(02): 244-252.
|
[4] |
WANG Hui, CHEN Yu, SHEN Zi-hao, LIU Pei-qian.
A trajectory data differential privacy protection scheme that combines contrast supervision and sorting tree
[J]. Computer Engineering & Science, 2023, 45(10): 1797-1805.
|
[5] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[6] |
CHENG Xiao-gang, GUO Ren, ZHOU Chang-li, .
A distributed privacy-preserving data mining framework based on rational cryptography
[J]. Computer Engineering & Science, 2022, 44(10): 1781-1787.
|
[7] |
LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, .
A Stacking ensemble clustering algorithm based on differential privacy protection
[J]. Computer Engineering & Science, 2022, 44(08): 1402-1408.
|
[8] |
KOU Bang-yan, CAO Su-zhen, Lv Jia .
A privacy protection scheme for parking services based on fog computing
[J]. Computer Engineering & Science, 2022, 44(07): 1232-1238.
|
[9] |
NIU Shu-fen, FANG Li-zhi, SONG Mi, WANG Cai-fen, DU Xiao-ni.
Privacy-preserving broadcast encryption in smart city
[J]. Computer Engineering & Science, 2022, 44(06): 1003-1012.
|
[10] |
YUAN Quan, YAN Fei-yang, WEN Zhi-yun, ZHANG Zhen-kang, .
A differential privacy protection algorithm in social network based on spectral clustering
[J]. Computer Engineering & Science, 2022, 44(02): 251-256.
|
[11] |
HU Yu-gu, GE Li-na, .
An improved differential privacy parameter setting and data optimization algorithm
[J]. Computer Engineering & Science, 2021, 43(10): 1758-1765.
|
[12] |
XIE Xiao-jie, LIANG Ying, WANG Zi-sen, DONG Xiang-xiang, .
A quantitative evaluation method of social network users’ privacy leakage
[J]. Computer Engineering & Science, 2021, 43(08): 1376-1386.
|
[13] |
.
A federated ensemble algorithm for multi-source data security
[J]. Computer Engineering & Science, 2021, 43(08): 1387-1397.
|
[14] |
JIA Jun-jie, QIN Hai-tao.
Anonymity of dynamic trajectory based on genetic algorithm
[J]. Computer Engineering & Science, 2021, 43(01): 142-150.
|
[15] |
LIU Xiang-zhen1,ZHANG Yu-lei1,LANG Xiao-li1,LUO Guang-ping1,WANG Cai-fen2.
A provably secure privacy-preserving multi-recipient
heterogeneous aggregate signcryption scheme
[J]. Computer Engineering & Science, 2020, 42(03): 441-448.
|