[1] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[2] |
Multi-scale Image Deblurring Model with DenseNet.
Multi-scale Image Deblurring Model with DenseNet
[J]. Computer Engineering and Applications, 2021, 57(24): 219-226.
|
[3] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[4] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[5] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
[6] |
SUN Yingying, JIA Zhentang, ZHU Haoyu.
Survey of Multimodal Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(21): 1-10.
|
[7] |
FENG Ailan, YANG Teng, KONG Jili.
Order Processing Research Based on Robotic Mobile Fulfillment Systems
[J]. Computer Engineering and Applications, 2020, 56(20): 243-250.
|
[8] |
XIN Ziyun, ZHANG Damin, CHEN Zhongyun, ZHANG Huijuan, YAN Wei.
Shared Crow Algorithm Using Multi-Segment Perturbation
[J]. Computer Engineering and Applications, 2020, 56(2): 55-61.
|
[9] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[10] |
SONG Xiuli1,2, XU Jiankun1,2.
(t,n) Threshold Quantum Secret Sharing Based on d-Dimensional Multi-Particle Entanglement State
[J]. Computer Engineering and Applications, 2019, 55(5): 89-95.
|
[11] |
XIONG Huafeng, SUN Yinghua, LI Jianbo, LIAN Wenjuan, LIU Xueqing.
Solving of Multi-Attribute Bilateral Matching Problem Under Background of Shared Economy
[J]. Computer Engineering and Applications, 2019, 55(24): 222-228.
|
[12] |
GAO Yue, YANG Xiaofei, MA Yingcang, WANG Yirui.
Density Peak Clustering Based on Shared [k]-Nearest Neighbors and Shared Reverse Nearest Neighbors
[J]. Computer Engineering and Applications, 2019, 55(20): 43-51.
|
[13] |
WANG Xiaoyu1, DING Shifei1,2.
Pairwise Constrained Spectral Clustering Algorithm Based on Shared Nearest Neighborhood
[J]. Computer Engineering and Applications, 2019, 55(2): 142-147.
|
[14] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
[15] |
SU Qing, LI Qian, ZHANG Junyuan, PENG Jiajin, HUANG Shaocong.
Ultra-lightweight RFID ownership transfer protocol of tag based on shared key
[J]. Computer Engineering and Applications, 2018, 54(4): 98-102.
|