[1] |
DU Xiuli, MA Zhenqian, QIU Shaoming, LYU Yana.
Recognition of Motor Imaging EEG Signals Based on Convolution Attention Mechanism
[J]. Computer Engineering and Applications, 2021, 57(18): 181-185.
|
[2] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[3] |
FAN Wenbing, SUN Zhiyuan.
SAR Image Segmentation Algorithm Based on Generalized Gauss Distribution in Wavelet Domain
[J]. Computer Engineering and Applications, 2020, 56(5): 222-226.
|
[4] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[5] |
CAO Jun, CHEN He, ZHANG Jiawei.
Research on Multi-Focus Image Fusion Algorithm Based on Super Resolution
[J]. Computer Engineering and Applications, 2020, 56(3): 180-186.
|
[6] |
GONG Rui, WANG Xiaochun.
Multi-Focus Image Fusion Method Based on C-EWT
[J]. Computer Engineering and Applications, 2020, 56(2): 201-210.
|
[7] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[8] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[9] |
YIN Longxiao, WU Zhongdong.
Revocation Control Scheme in CP-ABE
[J]. Computer Engineering and Applications, 2020, 56(13): 100-105.
|
[10] |
WANG Jingyu, LUAN Junqing, TAN Yuesheng.
Research on Big Data Access Control Model Based on Data Sensitivity
[J]. Computer Engineering and Applications, 2019, 55(23): 70-77.
|
[11] |
CHEN Lu, WANG Ze.
Access Control Scheme Based on ATP-ABE
[J]. Computer Engineering and Applications, 2019, 55(2): 79-85.
|
[12] |
GU Tingting, LIU Xinhui, SANG Qingbing, LI Chaofeng.
No-Reference Image Quality Assessment Algorithm for Stereoscopic Images via Dual-Tree Complex Wavelet Transform
[J]. Computer Engineering and Applications, 2019, 55(2): 154-161.
|
[13] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[14] |
YANG Xia, ZHU Xiaodong, LIU Yuanning, FENG Jiakai, LIU Shuai.
Iris Recognition Method Based on Block Wavelet Feature Combined with BP Neural Network
[J]. Computer Engineering and Applications, 2019, 55(18): 132-139.
|
[15] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|