| [1] |
ZHANG Yufeng,LOU Fang,ZHANG Li.
Security assessment of web applications
based on software attack surface
[J]. J4, 20160101, 38(01): 73-77.
|
| [2] |
LI Junzhe, FU Zhenxin, YANG Honghui, MA Yinping, LI Ruomiao, FAN Chun, .
Design and implementation of a cross-cluster data migration system for computational networks
[J]. Computer Engineering & Science, 2025, 47(05): 775-786.
|
| [3] |
HAN Xiao-xuan, ZHOU Wen-an, HAN Zhen.
Vulnerability analysis and verification of 5G-AKA authentication mechanism
[J]. Computer Engineering & Science, 2024, 46(12): 2149-2157.
|
| [4] |
SHEN Fan-fan, TANG Xing-yi, ZHANG Jun, XU Chao, CHEN Yong, HE Yan-xiang.
Malicious behavior detection method based on iFA and improved LSTM network
[J]. Computer Engineering & Science, 2024, 46(12): 2158-2170.
|
| [5] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(09): 1606-1615.
|
| [6] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
| [7] |
XUN Peng, CHEN Hong-yan, WANG Yong-zhi, LI Shi-jie.
An intrinsic secure open shortest path first protocol based on identity cryptography
[J]. Computer Engineering & Science, 2024, 46(06): 1022-1031.
|
| [8] |
GUO Chen-liang, YAN Shao-hong, ZONG Chen-qi.
Research on parallel acceleration of line cloud privacy attack algorithm
[J]. Computer Engineering & Science, 2024, 46(04): 615-625.
|
| [9] |
YANG Yu-jin, WANG Kun, CHEN Zhi-gang, XU Yue, LI Bin.
An anomaly multi-classification model based on capsule network
[J]. Computer Engineering & Science, 2024, 46(03): 427-439.
|
| [10] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(03): 440-452.
|
| [11] |
WANG Rui-bo, WU Zhen-wei, ZHANG Wen-zhe, WU Hui-jun, ZHANG-YU Shu-qing, LU Kai.
Fine-grained memory access monitoring based on memory protection keys
[J]. Computer Engineering & Science, 2024, 46(01): 21-27.
|
| [12] |
XIA Ge-ming, YU Chao-dong, CHEN Jian.
Trust problems in edge computing:Challenges and reviews
[J]. Computer Engineering & Science, 2023, 45(08): 1393-1404.
|
| [13] |
YU Jin-ping, ZHU Wei-feng, LIAO Lie-fa.
Entity recognition of support policy text based on RoBERTa-wwm-BiLSTM-CRF
[J]. Computer Engineering & Science, 2023, 45(08): 1498-1507.
|
| [14] |
PENG Kun-yan, YIN Xiang, LIU Xiao-zhu, LI Heng-yu.
A strategy search method based on particle swarm optimization and deep reinforcement learning
[J]. Computer Engineering & Science, 2023, 45(04): 718-725.
|
| [15] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|