[1] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[2] |
MENG Yuan, TU Shanshan, YU Jinliang.
Detection Scheme of Impersonation Attack Based on DQL Algorithm in Fog Computing
[J]. Computer Engineering and Applications, 2020, 56(10): 63-68.
|
[3] |
YE Xuemei1,2, MAO Xuemin1,2, XIA Jinchun1,2, WANG Bo1,2.
Improved Approach to TF-IDF Algorithm in Text Classification
[J]. Computer Engineering and Applications, 2019, 55(2): 104-109.
|
[4] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
[5] |
XIANG Guangli, LI Ankang, LIN Xiang, XIONG Bin.
Multiple keywords retrieval scheme based on homomorphic encryption
[J]. Computer Engineering and Applications, 2018, 54(2): 97-101.
|
[6] |
SU Zhenhua.
Crossing number of K1,1,2,2×Sn
[J]. Computer Engineering and Applications, 2018, 54(14): 52-55.
|
[7] |
ZHANG Shaoyang, CAO Jiabo, WANG Zifan, QU Weidong.
Chinese paragraph similarity calculated based on weighted bipartite graph match
[J]. Computer Engineering and Applications, 2017, 53(18): 95-101.
|
[8] |
ZHOU Houqing.
Construction of hyperenergetic integral circulant graphs for network topology
[J]. Computer Engineering and Applications, 2016, 52(9): 23-27.
|
[9] |
CHENG Yusheng1,2, LIANG Hui2, WANG Yibin1,2, REN Yong2.
Research of text similarity combining micro variation of keywords and LD algorithm
[J]. Computer Engineering and Applications, 2016, 52(8): 70-73.
|
[10] |
LI Hongxia, PANG Xiaoqiong.
Searchable homomorphic encryption scheme supporting multi-keyword ranking
[J]. Computer Engineering and Applications, 2016, 52(22): 93-98.
|
[11] |
LI Dan, GAN Lu, YANG Xiaowei, ZHOU Pan, LIAO Hongshu.
Blind estimation algorithm of BCH codes parameters based on cyclotomic cosets over finite fields
[J]. Computer Engineering and Applications, 2016, 52(2): 92-95.
|
[12] |
YANG Xiaofu, QI Jiandong, JI Pengfei, ZHU Wenfei.
New text clustering algorithm based on CF tree and KNN graph partition
[J]. Computer Engineering and Applications, 2015, 51(6): 114-119.
|
[13] |
ZHANG Qingqing, LIU Xilin.
Sentiment analysis based on dependency syntactic relation
[J]. Computer Engineering and Applications, 2015, 51(22): 28-32.
|
[14] |
LI Huijia, LONG Min.
Design and analysis of HMAC algorithm based on chaotic maps
[J]. Computer Engineering and Applications, 2015, 51(22): 109-114.
|
[15] |
DENG Fei1, ZHU Ying2.
Mutual password-based client/server authentication protocol
[J]. Computer Engineering and Applications, 2015, 51(20): 72-76.
|