[1] |
GUO Chang-hao, TANG Xiang-yun, WENG Yu.
A data heterogeneity processing method based on asynchronous hierarchical federated learning
[J]. Computer Engineering & Science, 2024, 46(07): 1237-1244.
|
[2] |
WU Xia, ZHENG Hong-ying, XIAO Di.
A dual-verification model watermarking scheme based on certification files
[J]. Computer Engineering & Science, 2024, 46(04): 647-656.
|
[3] |
LI Lei, ZHENG Li-ming, WANG Hong-yi, CHAI Yong-yi, LIU Pei-guo.
A 6H parallel computing architecture for edge computing
[J]. Computer Engineering & Science, 2023, 45(09): 1544-1552.
|
[4] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[5] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[6] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[7] |
DING Yan, WANG Chuang, FENG Liao-liao, WANG Feng, CHANG Jun-sheng.
Trusted data circulation between alliances based on supervision of blockchain
[J]. Computer Engineering & Science, 2022, 44(10): 1771-1780.
|
[8] |
GONG Rui, SHI Wei, LIU Wei, ZHANG Jian-feng, WANG Lei.
Design and implementation of CPU secure boot based on NAND Flash
[J]. Computer Engineering & Science, 2022, 44(06): 971-978.
|
[9] |
CHEN Xiang-guo, SHANG Fan, SONG Jun-qiang.
Comparison among embedded system security protection schemes and their application case analysis
[J]. Computer Engineering & Science, 2022, 44(03): 417-426.
|
[10] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
[11] |
ZHAO Guo-sheng, WANG Tian-tian, WANG Jian.
A dynamic trust evaluation model for edge devices
[J]. Computer Engineering & Science, 2021, 43(09): 1574-1583.
|
[12] |
JI Zi-hao, JIANG Ling-yun.
A genetic-based multi-site collaborative computation offloading algorithm
[J]. Computer Engineering & Science, 2021, 43(03): 426-434.
|
[13] |
SUN Jia-hao, WANG Cheng-cheng, TANG Dao-xian, LI Yue-hua.
Research and design of 6LoWPAN network multicast communication scheme
[J]. Computer Engineering & Science, 2021, 43(02): 288-294.
|
[14] |
YANG Bao-xuan, DONG Pan, ZHANG Li-jun, DING Yan.
Performance optimization of secure application based on TrustZone
[J]. Computer Engineering & Science, 2020, 42(12): 2141-2150.
|
[15] |
MA Yan-fang1,WANG Meng-yue1,ZHOU Wei1,CHEN Liang2.
A trustworthiness-based development cost
allocation algorithm of modular software
[J]. Computer Engineering & Science, 2020, 42(06): 1021-1029.
|