[1] |
NONG Qiang, SHAO Meng, ZHANG Bang-bang, LIU Zi-yu, .
A lattice-based hierarchical certificateless authentication scheme with message recovery for ADS-B
[J]. Computer Engineering & Science, 2023, 45(03): 462-469.
|
[2] |
JIA Jun-jie, YAO Ye-wang, CHEN Wang-hu.
A group recommendation algorithm based on non-negative matrix factorization
[J]. Computer Engineering & Science, 2022, 44(05): 933-943.
|
[3] |
Lv Gao-feng, WANG Yu-peng, YANG Rong-jia, TANG Zhu.
Design of aggregation-based FlowRadar acceleration model for network data collection
[J]. Computer Engineering & Science, 2022, 44(02): 220-226.
|
[4] |
LI Shu-ao, XIE Qing, MA Yan-chun, LIU Yong-jian.
An image semantic segmentation method based on path aggregation Atrous convolutional network
[J]. Computer Engineering & Science, 2021, 43(04): 712-720.
|
[5] |
HU Zhen-hai,WANG Li-song.
A sensor network spatial range aggregation query
processing algorithm against data eavesdropping attacks
[J]. Computer Engineering & Science, 2020, 42(01): 46-54.
|
[6] |
BING Rui1,MA Hui-fang1,2,3,LIU Yu-hang1,YU Li1.
A weighted graph aggregation algorithm based
on structural similarity and attribute similarity
[J]. Computer Engineering & Science, 2019, 41(10): 1777-1784.
|
[7] |
WANG Rui,CAO Su-zhen,WANG Fei,LANG Xiao-li,DU Xia-ling.
A batch message authentication scheme based on
certificateless key insulation in vehicular ad hoc networks
[J]. Computer Engineering & Science, 2019, 41(09): 1588-1596.
|
[8] |
BAI Ying-ying,WANG Hui-qing,GUO Zhi-rong.
A time series SAX model based on local mean
decomposition and improved wavelet entropy
[J]. Computer Engineering & Science, 2019, 41(08): 1490-1496.
|
[9] |
ZHANG Yulei1,LIU Xiangzhen1,ZHANG Yongjie2,LUO Guangping1,CHEN Wenjuan1,WANG Caifen1.
A provable secure from CLPKC to IDPKC
online/offline heterogeneous signcryption scheme
[J]. Computer Engineering & Science, 2019, 41(05): 813-820.
|
[10] |
WU Jianping,YIN Fukang,PENG Jun,YANG Jinhui.
Edge weight selection of the aggregation-type
algebraic multigrid preconditioner from top to bottom
[J]. Computer Engineering & Science, 2019, 41(02): 191-196.
|
[11] |
NIU Shu-fen,NIU Ling,WANG Cai-fen,YANG Xi-yan,JIA Xiang-dong.
Privacy-preserving multi-recipient aggregate signcryption
for heterogeneous cryptography systems
[J]. Computer Engineering & Science, 2018, 40(05): 805-812.
|
[12] |
YANG Xiao-dong1,2,YANG Ping1,LI Yan1,LIU Ting-ting1,WANG Cai-fen1.
A message authentication scheme for VANET
based on certificateless proxy re-signature
[J]. Computer Engineering & Science, 2018, 40(01): 40-44.
|
[13] |
YANG Yong,LIANG Chen-cheng.
Methods of aggregating intuitionistic fuzzy information based
on ε-amended and their applications in decision making
[J]. Computer Engineering & Science, 2017, 39(09): 1765-1773.
|
[14] |
CHEN Wanghu,DUAN Ju,YU Maoyi.
A scheduling policy of scientific workflows allowing
the violation of local time constraints
[J]. Computer Engineering & Science, 2016, 38(11): 2165-2171.
|
[15] |
ZHOU Caixue.
Cryptanalysis and improvement of
some signcryption schemes
[J]. Computer Engineering & Science, 2016, 38(11): 2246-2253.
|