[1] |
MEN Jiawei, LAI Chengzhe.
Trust Management Scheme with Incentive Mechanism for Cooperative Download of Internet of Vehicles
[J]. Computer Engineering and Applications, 2021, 57(5): 100-106.
|
[2] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[3] |
GU Junhua, CHEN Bo, WANG Rui, ZHANG Suqi.
Social Recommendation Combined with Important Nodes Trust Propagation
[J]. Computer Engineering and Applications, 2021, 57(17): 190-195.
|
[4] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[5] |
ZHANG Jin, SUN Fuzhen, WANG Shaoqing, WANG Shuai, LU Xiangzhi.
POI Recommendation Algorithm with Fusing Social Relation and Geographical Information
[J]. Computer Engineering and Applications, 2020, 56(5): 173-178.
|
[6] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[7] |
GU Mingxing, HUANG Weijian, HUANG Yuan, SHENG Long, SHEN Chao, ZHANG Mengtian.
Collaborative Filtering Recommendation Combining Attribute Clustering and Improving User Similarity
[J]. Computer Engineering and Applications, 2020, 56(22): 185-190.
|
[8] |
HAO Yuchen, LIU Chen.
Research on Evolution of Views of Network Community Based on Media Intervention and User Trust
[J]. Computer Engineering and Applications, 2020, 56(16): 156-164.
|
[9] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[10] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[11] |
LIU Liwei1, SUN Jianzhi1, TAN Li1, YANG Bin2.
Research on Trusted Authentication Method of Network Device Based on IMC/IMV
[J]. Computer Engineering and Applications, 2019, 55(9): 79-86.
|
[12] |
WEI Jin1, LI Hui2, FANG Minglei3.
Design of Network-Targeted W-State Double-Server Blind Quantum Computation Protocols
[J]. Computer Engineering and Applications, 2019, 55(6): 67-72.
|
[13] |
ZHANG Pengfei, WANG Yigui, ZHANG Zhijun.
Research on Personalized Recommendation Algorithm Based on Label and Multi-Information
[J]. Computer Engineering and Applications, 2019, 55(5): 159-165.
|
[14] |
CAO Xia1, LI Ping1,2, ZHANG Luyao1.
Social Recommendation Algorithm Based on Domain-Sensitive Interest Circle
[J]. Computer Engineering and Applications, 2019, 55(4): 84-90.
|
[15] |
XIE Yingjie1,2, ZENG Guosun1.
Text Search Method Based on Trust Semantics Deep Learning Neural Network
[J]. Computer Engineering and Applications, 2019, 55(3): 96-103.
|