[1] |
ZHANG Fuliang, LIANG Yiwen, TAN Chengyu.
Artificial Natural Killer Cell Detection Model for Android Malware
[J]. Computer Engineering and Applications, 2021, 57(6): 74-80.
|
[2] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[3] |
WENG Xiaoyong.
Research on Blockchain Based Cloud Computing Data Sharing System
[J]. Computer Engineering and Applications, 2021, 57(3): 120-124.
|
[4] |
TIAN Zhuojing, HUANG Zhenchun, ZHANG Yinong.
Review of Task Scheduling Methods in Cloud Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(2): 1-11.
|
[5] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[6] |
SHEN Shaoyu, CAI Manchun, LU Tianliang, ZHAO Qi.
Intrusion Detection Algorithm based on LFKPCA-DWELM
[J]. Computer Engineering and Applications, 2021, 57(17): 130-137.
|
[7] |
YANG Xinmin, DONG Hongbin, TAN Chengyu, ZHOU Wen.
Dendritic Cell Model Using Singular Value Decomposition and Information Gain
[J]. Computer Engineering and Applications, 2021, 57(15): 156-162.
|
[8] |
HU Heng, JIN Fenglin, LANG Siqi.
Survey of Research on Computation Offloading Technology in Mobile Edge Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(14): 60-74.
|
[9] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[10] |
CHEN Haiyang, JIN Xiaolei, NIU Longhui, LIU Xiqing.
Optimization of Regional Traffic Lights Timing Based on Improved Clonal Selection Algorithm
[J]. Computer Engineering and Applications, 2020, 56(9): 272-278.
|
[11] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[12] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[13] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[14] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[15] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|