[1] |
SHEN Xuan, WANG Xinmei, HE Jun, SUN Zhiyuan.
Revised Impossible Differential Attack on Reduced 6-Round Robin
[J]. Computer Engineering and Applications, 2021, 57(5): 95-99.
|
[2] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[3] |
LIAO Liefa, YANG Hong.
Review of Beetle Antennae Search
[J]. Computer Engineering and Applications, 2021, 57(12): 54-64.
|
[4] |
WANG Tong, ZHU Minling.
Study on Fast Realization of Serial Test and Approximate Entropy Test
[J]. Computer Engineering and Applications, 2020, 56(15): 113-117.
|
[5] |
ZHU Shuqin, LIU Rongyue, ZHOU Ranran, WANG Wenhong.
New Image Encryption Algorithm Based on Key Dynamic Selection Mechanism
[J]. Computer Engineering and Applications, 2019, 55(9): 56-64.
|
[6] |
WANG Yong, FANG Xiaoqiang, WANG Ying.
Hyperchaos System and AES Combined with Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(8): 164-170.
|
[7] |
FENG Jianxin1,2, LI Hui1,2, LIU Zhiguo1,2.
New Flame Color Space—IFCS
[J]. Computer Engineering and Applications, 2019, 55(5): 203-210.
|
[8] |
HUANG Yuda1, WANG Yiran2, NIU Sijie3.
Analysis and Optimization of GSO Algorithm Based on Chaos and Self-Adaptive Search Strategy
[J]. Computer Engineering and Applications, 2019, 55(3): 147-153.
|
[9] |
CHEN Jie, ZHANG Wendong, SU Linlin, SANG Shengbo.
Spacecraft Attitude-Orbit Control Algorithm Based on Lyapunov Stability Criterion and CPSO Algorithm
[J]. Computer Engineering and Applications, 2019, 55(24): 229-234.
|
[10] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[11] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[12] |
LI Longshu1,2, ZHANG Xiaojian2.
New chaos particle swarm optimization based on adaptive inertia weight
[J]. Computer Engineering and Applications, 2018, 54(9): 139-144.
|
[13] |
LV Congdong.
Relation between IP-secure and TA-secure in intransitive non-interference
[J]. Computer Engineering and Applications, 2018, 54(8): 78-84.
|
[14] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|
[15] |
ZHAO Hongda, QI Yong, LI Qianmu.
Ubiquitous network security risk assessment modeling based on COOPN
[J]. Computer Engineering and Applications, 2018, 54(4): 122-127.
|