[1] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[2] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[3] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[4] |
NIU Kun, GAO Zhong-he, ZHANG Fan.
An improved VIRE location algorithm for the whole region
[J]. Computer Engineering & Science, 2022, 44(09): 1602-1609.
|
[5] |
LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, .
A Stacking ensemble clustering algorithm based on differential privacy protection
[J]. Computer Engineering & Science, 2022, 44(08): 1402-1408.
|
[6] |
KOU Bang-yan, CAO Su-zhen, Lv Jia .
A privacy protection scheme for parking services based on fog computing
[J]. Computer Engineering & Science, 2022, 44(07): 1232-1238.
|
[7] |
HU Yu-gu, GE Li-na, .
An improved differential privacy parameter setting and data optimization algorithm
[J]. Computer Engineering & Science, 2021, 43(10): 1758-1765.
|
[8] |
XIE Xiao-jie, LIANG Ying, WANG Zi-sen, DONG Xiang-xiang, .
A quantitative evaluation method of social network users’ privacy leakage
[J]. Computer Engineering & Science, 2021, 43(08): 1376-1386.
|
[9] |
.
A federated ensemble algorithm for multi-source data security
[J]. Computer Engineering & Science, 2021, 43(08): 1387-1397.
|
[10] |
YANG Fan1,2,REN Shou-gang3,XU Huan-liang3,SUN Yuan-hao2,YANG Xing2.
A RFID tag number estimation algorithm
based on bit estimation
[J]. Computer Engineering & Science, 2020, 42(03): 449-455.
|
[11] |
HU Zhen-hai,WANG Li-song.
A sensor network spatial range aggregation query
processing algorithm against data eavesdropping attacks
[J]. Computer Engineering & Science, 2020, 42(01): 46-54.
|
[12] |
JU Ya-rong,CUI Hao,NING Ya-hui,WANG Wei-jia.
Classroom teaching design of “university computer
foundation” course based on BOPPPS model
[J]. Computer Engineering & Science, 2019, 41(增刊S1): 134-138.
|
[13] |
LI Xin-jian,LIU Man-dan.
Correlation measurement of campus wireless network
users based on the shortest time distance
[J]. Computer Engineering & Science, 2019, 41(10): 1755-1762.
|
[14] |
ZHANG Li-hua1,LAN Fan1,JIANG Pan-pan2,JIANG Teng-fei2.
A secure medical record storage and
sharing scheme based on dual-blockchain
[J]. Computer Engineering & Science, 2019, 41(09): 1581-1587.
|
[15] |
QIAN Wen-gao1,GENG Hong1,MA Hong-yan2.
Modeling and simulation of aircraft virtual maintenance
process based on assembly sequence constraints
[J]. Computer Engineering & Science, 2019, 41(08): 1482-1489.
|