| [1] |
WANG Yuheng, LIU Qiang, WU Xiaojie.
RCGNN: Robustness certification for graph neural networks under graph injection attacks
[J]. Computer Engineering & Science, 2025, 47(3): 434-447.
|
| [2] |
XU Tianyou, GAO Guangyong.
Robust image hiding by invertible generative adversarial network
[J]. Computer Engineering & Science, 2025, 47(2): 288-297.
|
| [3] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(3): 453-462.
|
| [4] |
YU Heng-biao, YI Xin, LI Sheng-guo, LI Fa, JIANG Hao, HUANG Chun.
A method for improving the robustness of mixed-precision optimization based on floating-point error analysis
[J]. Computer Engineering & Science, 2024, 46(11): 1924-1930.
|
| [5] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(9): 1563-1571.
|
| [6] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(3): 434-442.
|
| [7] |
TAN Hong-ye, XING Qin-jie.
Robustness enhancement oriented multi task machine reading comprehension
[J]. Computer Engineering & Science, 2023, 45(2): 363-369.
|
| [8] |
WANG Fei-fei, BEN Ke-rong, ZHANG Xian.
Research on robust speech recognition technology based on domain knowledge
[J]. Computer Engineering & Science, 2023, 45(12): 2155-2164.
|
| [9] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(6): 1030-1036.
|
| [10] |
LI Wei-an, XIONG Xiang-guang, XIA Dao-xun.
A color image robust watermarking algorithm based on Schur decomposition and chaotic scrambling
[J]. Computer Engineering & Science, 2021, 43(7): 1243-1249.
|
| [11] |
LI Wei-an,XIONG Xiang-guang,XIA Dao-xun.
A robust watermarking algorithm based
on hyper-chaotic and Slant transform
[J]. Computer Engineering & Science, 2020, 42(5): 812-818.
|
| [12] |
NIU Shufen, WANG Jinfeng, WANG Bobin, CHEN Jingmin, DU Xiaoni.
A searchable encryption scheme supporting multi-keyword retrieval on blockchain
[J]. Computer Engineering & Science, 2020, 42(11): 2005-2012.
|
| [13] |
FU Wei1,LI Moci2,ZHAO Huarong2,WU Yong2.
CRSHE: A novel ciphertext retrieval scheme
based on homomorphic encryption
[J]. Computer Engineering & Science, 2018, 40(9): 1540-1545.
|
| [14] |
YANG Xiaodong,YANG Miaomiao,LIU Tingting,WANG Caifen.
A multi-domain access control scheme based on
multi-authority attribute encryption for cloud storage
[J]. Computer Engineering & Science, 2018, 40(7): 1192-1198.
|
| [15] |
QIAN Zheng1,2,XIA Hongxia2.
Remote audit of big data cloud storage based on
finite field algebraic signature partition table
[J]. Computer Engineering & Science, 2018, 40(11): 1907-1914.
|