| [1] |
.
A cross-domain mutual authentication scheme based on Chebyshev chaotic map for V2G
[J]. Computer Engineering & Science, 2025, 47(03): 472-484.
|
| [2] |
WU Peicheng, ZHAO Xujun, JIN Lizhong.
Anomaly detection of stream data based on grid density stacking
[J]. Computer Engineering & Science, 2025, 47(01): 75-85.
|
| [3] |
DU Hao, MAO Run-zhang, DENG Yun-tong, HUANG Si-lu, XU Xiao-wen.
MiniBranRAP:A minimizing branch parallel algorithm of the coarse matrix computation in AMG solver
[J]. Computer Engineering & Science, 2024, 46(07): 1158-1166.
|
| [4] |
CHEN Tian-yu, LI Chuan, WANG Yan-hui.
Design of high-speed BGA and PCB transmission structure for extended Chiplet application
[J]. Computer Engineering & Science, 2024, 46(06): 976-983.
|
| [5] |
LI Liu-hui, WANG Liang, YANG Chun-yan, CHEN Yi-long, CHEN Peng.
Preparation and high-precision assembly technique of CCGA devices
[J]. Computer Engineering & Science, 2024, 46(05): 794-800.
|
| [6] |
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei.
A revocable traceable access control scheme in autonomous vehicle platoon
[J]. Computer Engineering & Science, 2024, 46(02): 232-243.
|
| [7] |
DING Yan, WANG Peng, WANG Chuang, LI Zhi-peng, SONG Lian-tao, FENG Liao-liao.
An attribute-based dynamic mandatory access control mechanism for operating system
[J]. Computer Engineering & Science, 2023, 45(10): 1770-1778.
|
| [8] |
CHEN Qing-jiang, GU Yuan.
A low-light image enhancement algorithm based on multi-scale depthwise separable convolution
[J]. Computer Engineering & Science, 2023, 45(10): 1830-1837.
|
| [9] |
ZHANG Zhi-yuan, CHEN Hai-jin, ZHANG Yi-ming.
An optimized A* algorithm based on local obstacle rate pre-acquisition and bidirectional parent node change
[J]. Computer Engineering & Science, 2023, 45(09): 1661-1669.
|
| [10] |
LUO Xiao-xia, DENG Yong, YE Ou.
A multi-stage adaptive hat detection algorithm in complex scenes
[J]. Computer Engineering & Science, 2023, 45(07): 1253-1262.
|
| [11] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(02): 286-294.
|
| [12] |
NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen.
A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals
[J]. Computer Engineering & Science, 2022, 44(11): 1941-1950.
|
| [13] |
QIANG Zi-lin, LIU Jian-guo, LIU Yun-feng, WEI Dong, QIANG Yan.
A power grid image retrieval method based on time-frequency domain hash coding
[J]. Computer Engineering & Science, 2022, 44(10): 1877-1884.
|
| [14] |
CUI Chen-yu, ZHANG Li-na, .
A threshold multi-secret sharing scheme with identity lock
[J]. Computer Engineering & Science, 2022, 44(08): 1382-1391.
|
| [15] |
WANG Xin, LIU Xiao-yan, ZHANG Kai-qi, WANG Xing, YAN Xin.
Design and implementation of a change event driven microservice composition platform
[J]. Computer Engineering & Science, 2021, 43(10): 1781-1788.
|