[1] |
XU Juan, YAO Rugui, GAO Yan, ZHU Liya.
Statistic Characteristics for Upper Bound of Rate Loss with Bounded Channel Estimation Error
[J]. Computer Engineering and Applications, 2020, 56(20): 82-86.
|
[2] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[3] |
YU Qihong, LI Jiguo.
Survey of Leakage-Resilient Encryption
[J]. Computer Engineering and Applications, 2019, 55(21): 18-25.
|
[4] |
LI Chuan1, LIU Baoxu2.
ParaIntentFuzz:Android applications parallel fuzzing system
[J]. Computer Engineering and Applications, 2018, 54(4): 110-116.
|
[5] |
DING Wei1, LIU Heng2, LIAO Chengwang1.
Design and implementation of timely monitoring system for microquake based on Android device
[J]. Computer Engineering and Applications, 2018, 54(17): 266-270.
|
[6] |
CHENG Zhao1,2, WANG Heming1, TANG Yongkang2, ZHANG Ying1.
Detail enhancement analysis based hardware Trojan detection using thermal maps
[J]. Computer Engineering and Applications, 2018, 54(16): 86-92.
|
[7] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[8] |
WANG Xinying, JIANG Zhiwei, CHEN Haiqun, WANG Kaiquan.
Study on pipeline leak diagnosis method based on SVM and DS theory
[J]. Computer Engineering and Applications, 2016, 52(5): 262-265.
|
[9] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|
[10] |
YU Qihong1,2, LI Jiguo2.
Continuous leakage resilient ciphertext-policy attribute-based encryption supporting attribute revocation
[J]. Computer Engineering and Applications, 2016, 52(20): 29-38.
|
[11] |
ZHAO Genlin1, LI Hua2.
Research on improved network data-leakage detection scheme
[J]. Computer Engineering and Applications, 2016, 52(2): 96-104.
|
[12] |
ZHU Hongjun1,2, HAN Yang1, HUA Baojian2, CHEN Hao1.
Application code memory leak analysis and detecting technology research in mobile
[J]. Computer Engineering and Applications, 2016, 52(17): 29-35.
|
[13] |
JI Zhanhuai 1,2, YAN Shenggang1.
Comparison of performance between discrete S transform frequency-domain algorithm and time-domain
[J]. Computer Engineering and Applications, 2015, 51(20): 16-21.
|
[14] |
KANG Xianzhi1, LI Jian1, ZHANG Yu1, WANG Weikui1, CHEN Ruidong2.
Research on pipeline leak location based on transient flow method
[J]. Computer Engineering and Applications, 2015, 51(19): 255-259.
|
[15] |
WANG Yulin1, TIAN Xuelong1,2, GAO Xueli1.
DSP realization of modified speech enhancement algorithm based on adaptive filters
[J]. Computer Engineering and Applications, 2015, 51(1): 208-212.
|