[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
WU Hao, XU Xingjian, MENG Fanjun.
Knowledge Graph-Assisted Multi-task Feature-Based Course Recommendation Algorithm
[J]. Computer Engineering and Applications, 2021, 57(21): 132-139.
|
[3] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[4] |
XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli.
Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake
[J]. Computer Engineering and Applications, 2021, 57(2): 113-118.
|
[5] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[6] |
WU Dongyang, DOU Jianping, LI Jun.
Design of Digital Twin System for Quadrotor
[J]. Computer Engineering and Applications, 2021, 57(16): 237-244.
|
[7] |
LI Leixiao, DENG Dan, LI Jie, WANG Yongsheng.
All-to-All Comparison Computing Data Distribution Strategy Based on Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2021, 57(15): 109-117.
|
[8] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[9] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[10] |
ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui.
Semantic Diversity Location Privacy Protection Method in Road Network Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 102-108.
|
[11] |
XU Bin, LIANG Xiaobing, SHEN Bo.
Non-interactive Queries Differential Privacy Protection Model in Big Data Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 116-121.
|
[12] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[13] |
ZHANG Siliang, LING Jie, CHEN Jiahui.
Traceable Blockchain Ledger Privacy Protection Scheme
[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
|
[14] |
YANG Ting, PANG Xiaoqiong, CHEN Wenjun, WANG Yunting, LIU Tianye.
Digital Rights Management Supporting Privacy Protection in Blockchain Environment
[J]. Computer Engineering and Applications, 2020, 56(23): 109-115.
|
[15] |
LI Ling, GU Xiaomei, LIU Zihao.
Application Research of Multi-subdomain Random Forest in Context-Aware Recommendation
[J]. Computer Engineering and Applications, 2020, 56(22): 132-141.
|