[1] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[2] |
LI Zhuangkuo, CHANG Kaixuan.
Ant Colony Optimization for Continuous Domains Applied to Cooperative Game
[J]. Computer Engineering and Applications, 2021, 57(24): 198-204.
|
[3] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[4] |
BAI Shouhua, GUO Guangsong, HU Tiantong.
Multi-modal Hybrid Index Optimization by Interactive Multi-objective Cultural Algorithm
[J]. Computer Engineering and Applications, 2021, 57(17): 80-87.
|
[5] |
QIAO Weitao, HUANG Haiyan, WANG Shan.
Semantic Similarity Calculation Based on Transformer Encoder
[J]. Computer Engineering and Applications, 2021, 57(14): 158-163.
|
[6] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[7] |
ZHANG Hainan, YOU Xiaoming, LIU Sheng, LIU Zhongqiang.
Interactive Learning Cuckoo Search Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 147-154.
|
[8] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[9] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
[10] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[11] |
ZHU Miaomiao, PAN Weijie, LIU Xiang, LV Jian, ZHAO Huiliang.
Interactive Genetic Algorithm Based on BP Neural Network and User Cognitive Surrogate Model
[J]. Computer Engineering and Applications, 2020, 56(2): 146-151.
|
[12] |
HAN Hu, LIU Guoli.
Interactive Attention Networks for Target-Based Sentiment Analysis
[J]. Computer Engineering and Applications, 2020, 56(18): 104-110.
|
[13] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[14] |
LIU Yang, LIN Min, LI Yanling.
Review of User Simulators for Interactive Retrieval
[J]. Computer Engineering and Applications, 2020, 56(10): 1-9.
|
[15] |
SONG Xiuli1,2, XU Jiankun1,2.
(t,n) Threshold Quantum Secret Sharing Based on d-Dimensional Multi-Particle Entanglement State
[J]. Computer Engineering and Applications, 2019, 55(5): 89-95.
|