| [1] |
JIA Haozhou, XU Peng , WANG Danchen, XU Yang, .
A RFID mutual authentication protocol based on a novel confusion operation
[J]. Computer Engineering & Science, 2025, 47(2): 247-255.
|
| [2] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(9): 1606-1615.
|
| [3] |
WANG Yong-jun, LIU Han-yang, WANG Hui, SHEN Zi-hao, LIU Kun, LIU Pei-qian.
A privacy-preserving region-sensitive crowdsensing task allocation mechanism
[J]. Computer Engineering & Science, 2024, 46(8): 1414-1424.
|
| [4] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(6): 1032-1040.
|
| [5] |
YANG Xu-dong, LI Qiu-yan, GAO Ling, LIU Xin, DENG Ya-ni.
A distributed location anonymization method based on multi-blockchain collaboration
[J]. Computer Engineering & Science, 2024, 46(12): 2171-2185.
|
| [6] |
WANG Tian-yang, LI Xiao-hui, CHEN Hong-yang.
A personalized differential privacy protection scheme for multidimensional data of participatory sensing devices
[J]. Computer Engineering & Science, 2024, 46(11): 1997-2006.
|
| [7] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(9): 1563-1571.
|
| [8] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(1): 77-84.
|
| [9] |
NIU Kun, GAO Zhong-he, ZHANG Fan.
An improved VIRE location algorithm for the whole region
[J]. Computer Engineering & Science, 2022, 44(9): 1602-1609.
|
| [10] |
LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, .
A Stacking ensemble clustering algorithm based on differential privacy protection
[J]. Computer Engineering & Science, 2022, 44(8): 1402-1408.
|
| [11] |
KOU Bang-yan, CAO Su-zhen, Lv Jia .
A privacy protection scheme for parking services based on fog computing
[J]. Computer Engineering & Science, 2022, 44(7): 1232-1238.
|
| [12] |
XIE Xiao-jie, LIANG Ying, WANG Zi-sen, DONG Xiang-xiang, .
A quantitative evaluation method of social network users’ privacy leakage
[J]. Computer Engineering & Science, 2021, 43(8): 1376-1386.
|
| [13] |
.
A federated ensemble algorithm for multi-source data security
[J]. Computer Engineering & Science, 2021, 43(8): 1387-1397.
|
| [14] |
HU Yu-gu, GE Li-na, .
An improved differential privacy parameter setting and data optimization algorithm
[J]. Computer Engineering & Science, 2021, 43(10): 1758-1765.
|
| [15] |
YANG Fan1,2,REN Shou-gang3,XU Huan-liang3,SUN Yuan-hao2,YANG Xing2.
A RFID tag number estimation algorithm
based on bit estimation
[J]. Computer Engineering & Science, 2020, 42(3): 449-455.
|