[1] |
HUANG Yilei, XIA Zhijie, WANG Yiming.
Research on False Information Dissemination Model of Strong-Ties Social Media
[J]. Computer Engineering and Applications, 2021, 57(9): 126-133.
|
[2] |
DAI Qi, LI Min, LIU Yang, LI Lihong.
Fast Attribute Reduction Algorithm Based on Fuzzy Hierarchical Quotient Space
[J]. Computer Engineering and Applications, 2021, 57(4): 55-60.
|
[3] |
LIU Teng, CHEN Heng, LI Guanyu.
Knowledge Graph Representation Learning Method Jointing FOL Rules
[J]. Computer Engineering and Applications, 2021, 57(4): 100-107.
|
[4] |
WANG Fang, ZHANG Xueying, HU Fengyun, LI Fenglian.
Ensemble Method Classifies EEG from Stroke Patients
[J]. Computer Engineering and Applications, 2021, 57(24): 276-282.
|
[5] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[6] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[7] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[8] |
XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli.
Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake
[J]. Computer Engineering and Applications, 2021, 57(2): 113-118.
|
[9] |
WANG Youfa, CHEN Hui, LUO Jianqiang.
Research Hotspots and Cutting-Edge Mining of Artificial Intelligence
[J]. Computer Engineering and Applications, 2021, 57(12): 46-53.
|
[10] |
LU Kai, ZHOU Yanju.
Research on User Influence of Virtual Community Based on Perspective of Information Diffusion
[J]. Computer Engineering and Applications, 2021, 57(10): 65-74.
|
[11] |
YING Wenjie, SANG Jitao.
Improved Hashing for Efficient Recommendation Method
[J]. Computer Engineering and Applications, 2020, 56(9): 75-83.
|
[12] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[13] |
ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui.
Semantic Diversity Location Privacy Protection Method in Road Network Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 102-108.
|
[14] |
XU Bin, LIANG Xiaobing, SHEN Bo.
Non-interactive Queries Differential Privacy Protection Model in Big Data Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 116-121.
|
[15] |
YUAN Xiaoping, CUI Qiwen, CHENG Gan, ZHANG Xia, ZHANG Yi, WANG Suyuan.
Improved Gabor Self Quotient Image Algorithm and Its Application to Face Recognition
[J]. Computer Engineering and Applications, 2020, 56(5): 206-213.
|