[1] |
YANG Xu-dong, LI Qiu-yan, GAO Ling, LIU Xin, DENG Ya-ni.
A distributed location anonymization method based on multi-blockchain collaboration
[J]. Computer Engineering & Science, 2024, 46(12): 2171-2185.
|
[2] |
YANG Song, WANG Xin-ru, LI Fan, ZHU Lie-huang, ZHAO Bo.
A blockchain-based crowdsourcing incentive mechanism
[J]. Computer Engineering & Science, 2024, 46(11): 1960-1970.
|
[3] |
WANG Tian-yang, LI Xiao-hui, CHEN Hong-yang.
A personalized differential privacy protection scheme for multidimensional data of participatory sensing devices
[J]. Computer Engineering & Science, 2024, 46(11): 1997-2006.
|
[4] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(09): 1606-1615.
|
[5] |
WANG Yong-jun, LIU Han-yang, WANG Hui, SHEN Zi-hao, LIU Kun, LIU Pei-qian.
A privacy-preserving region-sensitive crowdsensing task allocation mechanism
[J]. Computer Engineering & Science, 2024, 46(08): 1414-1424.
|
[6] |
WEN Xin, ZENG Tao, LI Chun-bo, XU Zi-chen.
A switch method of model inference serving oriented to serverless computing
[J]. Computer Engineering & Science, 2024, 46(07): 1210-1217.
|
[7] |
DING Jian-ping, LI Wei-jun, LIU Xue-yang, CHEN Xu.
A review of named entity recognition research
[J]. Computer Engineering & Science, 2024, 46(07): 1296-1310.
|
[8] |
HUANG Zhi-hui, XIAO Xiang-li, ZHANG Yu-shu, XUE Ming-fu.
Copyright protection of open-sourced datasets based on invisible backdoor watermarking
[J]. Computer Engineering & Science, 2024, 46(06): 1013-1021.
|
[9] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[10] |
GAO Shan, LI Shi-jie, CAI Zhi-ping.
A survey of Chinese text classification based on deep learning
[J]. Computer Engineering & Science, 2024, 46(04): 684-692.
|
[11] |
HUANG Peng-cheng, FENG Chao-chao, MA Chi-yuan, .
Machine learning prediction of timing violation under unknown corners
[J]. Computer Engineering & Science, 2024, 46(03): 395-399.
|
[12] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(03): 440-452.
|
[13] |
ZHAO Yan, MA Hui-fang, WANG Wen-tao, TONG Hai-bin, HE Xiang-chun.
A reliable response representation enhanced knowledge tracing method
[J]. Computer Engineering & Science, 2024, 46(03): 535-544.
|
[14] |
DONG Yan-ling , ZHANG Shu-fen, XU Jing-cheng, WANG Hao-shi, .
Research on differential privacy protection for Stacking algorithm
[J]. Computer Engineering & Science, 2024, 46(02): 244-252.
|
[15] |
PENG Chang, LIU Qing-zhi, CHEN Chang-bo, .
Loop permutation and auto-tuning under polyhedral model
[J]. Computer Engineering & Science, 2023, 45(12): 2121-2134.
|