[1] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[2] |
LI Ling, WANG Zheng, LI Na.
Access Control Scheme Supporting Computing Outsourcing in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(6): 81-87.
|
[3] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[4] |
CHENG Yuhang, ZHANG Jianqin, LI Jiangchuan, ZHANG An.
Visual Mining and Analysis Method of Text Data in Traffic Accident
[J]. Computer Engineering and Applications, 2021, 57(21): 116-122.
|
[5] |
CHEN Fei, YE Chunming, CHEN Tao.
Design of Food Traceability System Based on Blockchain
[J]. Computer Engineering and Applications, 2021, 57(2): 60-69.
|
[6] |
XIE Yinggang, LAN Jiangyu.
Review of Collaborative Robot and Its Motion Planning Methods
[J]. Computer Engineering and Applications, 2021, 57(13): 18-33.
|
[7] |
ZHANG Shiqi, WEI Feifei, FAN Xinyue.
Model of Secure Routes Selection Influenced by Weather and Traffic Accidents
[J]. Computer Engineering and Applications, 2021, 57(10): 246-251.
|
[8] |
ZHANG Wuyi, LI Jianguo, GONG Yuwen.
Safety Awareness Evolution Model of High-Altitude Parabolic and Falling Objects Prevention
[J]. Computer Engineering and Applications, 2021, 57(1): 254-260.
|
[9] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[10] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[11] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[12] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[13] |
NIE Mengfei, PANG Xiaoqiong, CHEN Wenjun, GONG Shiming, YANG Ting.
Fair Searchable Encryption Scheme Based on Ethereum Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 69-75.
|
[14] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[15] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|