| [1] |
ZHU Xiaojie, CHENG Zhenjing, WANG Huajin, YANG Gang, TIAN Yao, FAN Dongwei, MI Linying, LIANG Zhaoji, .
BigFlow: A service system for cross-center collaborative analysis of scientific data
[J]. Computer Engineering & Science, 2025, 47(4): 706-717.
|
| [2] |
YANG Song, WANG Xin-ru, LI Fan, ZHU Lie-huang, ZHAO Bo.
A blockchain-based crowdsourcing incentive mechanism
[J]. Computer Engineering & Science, 2024, 46(11): 1960-1970.
|
| [3] |
XIA Ge-ming, YU Chao-dong, CHEN Jian.
Trust problems in edge computing:Challenges and reviews
[J]. Computer Engineering & Science, 2023, 45(8): 1393-1404.
|
| [4] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(3): 434-442.
|
| [5] |
GONG Rui, SHI Wei, LIU Wei, ZHANG Jian-feng, WANG Lei.
Design and implementation of CPU secure boot based on NAND Flash
[J]. Computer Engineering & Science, 2022, 44(6): 971-978.
|
| [6] |
CHEN Xiang-guo, SHANG Fan, SONG Jun-qiang.
Comparison among embedded system security protection schemes and their application case analysis
[J]. Computer Engineering & Science, 2022, 44(3): 417-426.
|
| [7] |
DING Yan, WANG Chuang, FENG Liao-liao, WANG Feng, CHANG Jun-sheng.
Trusted data circulation between alliances based on supervision of blockchain
[J]. Computer Engineering & Science, 2022, 44(10): 1771-1780.
|
| [8] |
ZHAO Guo-sheng, WANG Tian-tian, WANG Jian.
A dynamic trust evaluation model for edge devices
[J]. Computer Engineering & Science, 2021, 43(9): 1574-1583.
|
| [9] |
MA Yan-fang1,WANG Meng-yue1,ZHOU Wei1,CHEN Liang2.
A trustworthiness-based development cost
allocation algorithm of modular software
[J]. Computer Engineering & Science, 2020, 42(6): 1021-1029.
|
| [10] |
LIU Hui, ZENG Bin, LIU Zi-kai.
Point-of-interest recommendation based on
neighbor selection strategy and trust relationship
[J]. Computer Engineering & Science, 2020, 42(2): 365-372.
|
| [11] |
YANG Bao-xuan, DONG Pan, ZHANG Li-jun, DING Yan.
Performance optimization of secure application based on TrustZone
[J]. Computer Engineering & Science, 2020, 42(12): 2141-2150.
|
| [12] |
YANG Feng-rui1,2,3,WU Xiao-hao1,2,WAN Cheng-feng1,2.
A fake review detection method
using emotional and belief function
[J]. Computer Engineering & Science, 2019, 41(9): 1679-1685.
|
| [13] |
WANG Xiji,ZHANG Gongxuan,GUO Ziheng.
An SoC trusted startup framework based
on trusted cryptographic module
[J]. Computer Engineering & Science, 2019, 41(4): 606-611.
|
| [14] |
ZHANG Jing1,2,XIONG Xiaoyu1,BAO Yibo3.
A TLD object tracking algorithm based on KCF similarity
[J]. Computer Engineering & Science, 2019, 41(2): 293-301.
|
| [15] |
YANG Feng-rui1,2,3,WU Xiao-hao 1,2,WAN Cheng-feng1,2.
A hybrid recommendation algorithm combining
trust degree and project association
[J]. Computer Engineering & Science, 2019, 41(11): 2048-2054.
|