[1] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[2] |
ZHU Jiaying, GAO Maoting.
AUV Path Planning Based on Particle Swarm Optimization and Improved Ant Colony Optimization
[J]. Computer Engineering and Applications, 2021, 57(6): 267-273.
|
[3] |
LI Ling, WANG Zheng, LI Na.
Access Control Scheme Supporting Computing Outsourcing in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(6): 81-87.
|
[4] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[5] |
HE Jiao, TAN Dailun.
Three-Dimensional Terrain Path Planning Based on Sight Range and Genetic Algorithm
[J]. Computer Engineering and Applications, 2021, 57(15): 279-285.
|
[6] |
LIU Jia, GUO Bin, ZHANG Jingjing, YAN Dong.
3D Registration Method for Augmented Reality Based on Visual and Haptic Integration
[J]. Computer Engineering and Applications, 2021, 57(11): 70-76.
|
[7] |
LI Xiaoyun, JIA Jie.
Technology of Fighting Detection Based on Three-Dimensional Convolution and Video Frame Sampling Algorithm
[J]. Computer Engineering and Applications, 2021, 57(10): 241-245.
|
[8] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[9] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[10] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[11] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[12] |
NIE Mengfei, PANG Xiaoqiong, CHEN Wenjun, GONG Shiming, YANG Ting.
Fair Searchable Encryption Scheme Based on Ethereum Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 69-75.
|
[13] |
WANG Haoyan, WANG Yumei.
Research on Cognitive Wireless Networks with Two Kinds of Cognitive Users and Channel Aggregation
[J]. Computer Engineering and Applications, 2020, 56(22): 100-108.
|
[14] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[15] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|