[1] |
MEN Jiawei, LAI Chengzhe.
Trust Management Scheme with Incentive Mechanism for Cooperative Download of Internet of Vehicles
[J]. Computer Engineering and Applications, 2021, 57(5): 100-106.
|
[2] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[3] |
GU Junhua, CHEN Bo, WANG Rui, ZHANG Suqi.
Social Recommendation Combined with Important Nodes Trust Propagation
[J]. Computer Engineering and Applications, 2021, 57(17): 190-195.
|
[4] |
ZHANG Liwei, WANG Sujing, DUAN Xianhua.
Fine-Grained Hierarchical Spatiotemporal Descriptors for Micro-Expression Recognition
[J]. Computer Engineering and Applications, 2021, 57(13): 154-160.
|
[5] |
CHEN Lichao, CHAO Xin, CAO Jianfang, PAN Lihu.
Application of ResNet with Independent Components in Fine-Grained Vehicle Recognition
[J]. Computer Engineering and Applications, 2021, 57(11): 248-253.
|
[6] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[7] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[8] |
ZHANG Jin, SUN Fuzhen, WANG Shaoqing, WANG Shuai, LU Xiangzhi.
POI Recommendation Algorithm with Fusing Social Relation and Geographical Information
[J]. Computer Engineering and Applications, 2020, 56(5): 173-178.
|
[9] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[10] |
LI Jinyuan, KANG Yan, YANG Qiyue, WANG Peiyao, CUI Guorong.
Aspect-Based Memory Network for Fine-Grained Product Sentiment Analysis
[J]. Computer Engineering and Applications, 2020, 56(3): 159-164.
|
[11] |
GU Mingxing, HUANG Weijian, HUANG Yuan, SHENG Long, SHEN Chao, ZHANG Mengtian.
Collaborative Filtering Recommendation Combining Attribute Clustering and Improving User Similarity
[J]. Computer Engineering and Applications, 2020, 56(22): 185-190.
|
[12] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[13] |
HAO Yuchen, LIU Chen.
Research on Evolution of Views of Network Community Based on Media Intervention and User Trust
[J]. Computer Engineering and Applications, 2020, 56(16): 156-164.
|
[14] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[15] |
YIN Longxiao, WU Zhongdong.
Revocation Control Scheme in CP-ABE
[J]. Computer Engineering and Applications, 2020, 56(13): 100-105.
|