[1] |
CAO Hao1, ZHUO Zepeng2 .
Recursive construction of balanced Boolean function with optimum algebraic immunity
[J]. Computer Engineering and Applications, 2017, 53(7): 133-135.
|
[2] |
HU Jianyong1, ZHANG Wenzheng1, CHEN Keifei2, DONG Xinfeng1.
Research on spectral immunity of m-sequences
[J]. Computer Engineering and Applications, 2017, 53(16): 74-78.
|
[3] |
WANG Yongqi1, ZHANG Guofu1,2, SU Zhaopin1,2, JIANG Jianguo1,2, ZHANG Ting1.
Algorithm for parallel distribution of emergency relief supplies based on two-dimensional immunity
[J]. Computer Engineering and Applications, 2017, 53(10): 230-240.
|
[4] |
XUE Juntao, JIN Zhigang, YANG Zhengling, ZHANG Jun.
Analysis of watermarking model based on similarity of vectors
[J]. Computer Engineering and Applications, 2016, 52(24): 116-120.
|
[5] |
KANG Liangcheng, LI Chaofeng.
JPEG compressed image quality assessment method based on digital watermarking in contourlet domain
[J]. Computer Engineering and Applications, 2016, 52(21): 206-210.
|
[6] |
JIANG Ce, PENG Jian, XIANG Lingyun, LI Feng.
Research on text reversible digital watermarking based on Hamming code
[J]. Computer Engineering and Applications, 2016, 52(11): 84-87.
|
[7] |
HUANG Dong, YANG Wan’an.
Robust digital watermarking by balancing feature points based on Harris-Laplacian
[J]. Computer Engineering and Applications, 2015, 51(7): 101-105.
|
[8] |
WANG Chong, LEI Xiujuan.
Improved fish swarm clustering algorithm combined with immunity-vaccination mechanism
[J]. Computer Engineering and Applications, 2015, 51(3): 138-142.
|
[9] |
WU Baiyan1, LI Chaokui1, WANG Wei2.
Vector map data watermarking model controlling curve shape distortion
[J]. Computer Engineering and Applications, 2014, 50(1): 74-77.
|
[10] |
ZHAO Yong, XIONG Shunqing, YUAN Sha, XIA Wei, ZHOU Weihong.
Multiple transform domain watermarking algorithm based on NSCT decomposition DCT transform and SVD decomposition
[J]. Computer Engineering and Applications, 2013, 49(20): 167-170.
|
[11] |
LIN Kezheng, YAO Huan.
Digital image watermarking algorithm based on HCM and DT-CWT
[J]. Computer Engineering and Applications, 2013, 49(18): 167-170.
|
[12] |
MA Lingyong1, CHONG Jinfeng2, ZHUO Zepeng2,3.
Research on algebraic immunity of Boolean function
[J]. Computer Engineering and Applications, 2013, 49(12): 84-85.
|
[13] |
CHENG Shuping1, TAN Liang1,2, HUANG Biao1, OUYANG Chenxing1.
Botnet propagation modeling and analysis
[J]. Computer Engineering and Applications, 2013, 49(1): 107-111.
|
[14] |
LIU Yang1,2, FENG Youqian1, LI Ruihu1.
Research on some cryptographical properties of self-dual Boolean function
[J]. Computer Engineering and Applications, 2012, 48(9): 63-66.
|
[15] |
ZHANG Fengmei, HAN Yadan, YAN Deqin.
Adaptive digital watermarking based on HVS and quantization
[J]. Computer Engineering and Applications, 2012, 48(34): 92-96.
|