[1] |
HAN Xiaowei, HAN Zhen, YUE Gaofeng, CUI Jianjiang.
Path Planning Algorithm of Disaster Relief UAV Based on Optimized A
[J]. Computer Engineering and Applications, 2021, 57(6): 232-238.
|
[2] |
ZHANG Junjie, ZHANG Cong, ZHAO Hanjie.
Dueling Deep Q Network Algorithm with State Value Reuse
[J]. Computer Engineering and Applications, 2021, 57(4): 134-140.
|
[3] |
WENG Xiaoyong.
Research on Blockchain Based Cloud Computing Data Sharing System
[J]. Computer Engineering and Applications, 2021, 57(3): 120-124.
|
[4] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[5] |
XIONG Jian, QIN Renchao, HE Mengyi, LIU Jianlan, TANG Fengyang.
Application of Improved Random Forest Algorithm in Android Malware Detection
[J]. Computer Engineering and Applications, 2021, 57(3): 130-136.
|
[6] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[7] |
CHEN Qianru, LI Yali, XU Kequan, LIU Yilong, WANG Shuqin.
WKNN Feature Selection Method Based on Self-Tuning Adaptive Genetic Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 164-171.
|
[8] |
GAN Xinyan, GAO Xiang.
Research on Cloud Manufacturing System Selection Based on Hesitant Fuzzy Decision Making Algorithm
[J]. Computer Engineering and Applications, 2021, 57(2): 134-142.
|
[9] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[10] |
XIA Ying, ZHANG Jinfeng.
POI Recommendation Fusing Social Relations and Local Geographic Factors
[J]. Computer Engineering and Applications, 2021, 57(15): 133-139.
|
[11] |
DAN Yufang, TAO Jianwen, XU Haote.
Semi-Supervised Classification Method of Possibilistic Clustering Assumption
[J]. Computer Engineering and Applications, 2020, 56(9): 65-74.
|
[12] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[13] |
WANG Yunmin, LI Hui, WANG Han, BAI Yongjie, NING Chonghui.
Research on Identifier Data Management Strategy of Industrial Internet Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(7): 1-7.
|
[14] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[15] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|