[1] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[2] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[3] |
LUO Shi-hang, HE Qing.
A multi-strategy fused equilibrium optimization algorithm and its application
[J]. Computer Engineering & Science, 2023, 45(08): 1508-1520.
|
[4] |
LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, .
A Stacking ensemble clustering algorithm based on differential privacy protection
[J]. Computer Engineering & Science, 2022, 44(08): 1402-1408.
|
[5] |
ZHAO Yu-hua, JIA Xiang-dong, HU Hai-xia, JING Le-tian .
An AoI minimization scheme of UAV-assisted wireless sensor networks
[J]. Computer Engineering & Science, 2022, 44(07): 1216-1222.
|
[6] |
KOU Bang-yan, CAO Su-zhen, Lv Jia .
A privacy protection scheme for parking services based on fog computing
[J]. Computer Engineering & Science, 2022, 44(07): 1232-1238.
|
[7] |
ZHANG Meng-jian, WANG Min, WANG Xiao, QIN Tao, YANG Jing, .
A hybrid particle swarm-butterfly algorithm for WSN node deployment
[J]. Computer Engineering & Science, 2022, 44(06): 1013-1022.
|
[8] |
GAO Hang, WU Jia-xin, CHEN Long, WU Ji-gang.
Security communication path planning of UAV sensor network under QoS guarantee
[J]. Computer Engineering & Science, 2022, 44(06): 1037-1045.
|
[9] |
XU Li-jin, HE Yan-fang.
Construction of a traffic blocking model for wireless sensor network based on random forest algorithm
[J]. Computer Engineering & Science, 2022, 44(05): 819-825.
|
[10] |
GOU Ping-zhang, YUAN Chen, ZHANG Fen.
A non-uniform clustering QoS routing algorithm based on software-defined wireless sensor networks
[J]. Computer Engineering & Science, 2022, 44(02): 227-236.
|
[11] |
YIN Ling, XIE Zhi-jun.
Charging path planning of multiple mobile-chargers based on space-time collaboration
[J]. Computer Engineering & Science, 2021, 43(12): 2183-2189.
|
[12] |
ZHANG Jing, WEI Miao, .
WSN area coverage optimization based on Delaunay triangulation strategy
[J]. Computer Engineering & Science, 2021, 43(11): 1944-1951.
|
[13] |
WEI Lian-suo, CHEN Qi-qi, HAN Jian, SU Yang.
A topology control algorithm of potential-game network based on region splitting and merging
[J]. Computer Engineering & Science, 2021, 43(11): 2063-2068.
|
[14] |
HU Yu-gu, GE Li-na, .
An improved differential privacy parameter setting and data optimization algorithm
[J]. Computer Engineering & Science, 2021, 43(10): 1758-1765.
|
[15] |
XIE Xiao-jie, LIANG Ying, WANG Zi-sen, DONG Xiang-xiang, .
A quantitative evaluation method of social network users’ privacy leakage
[J]. Computer Engineering & Science, 2021, 43(08): 1376-1386.
|