[1] |
ZHOU Liang, YING Huan, DAI Bo, QIU Yimin.
Security and Efficient Biometric Identification Outsourcing Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 127-135.
|
[2] |
GUAN Wei1, ZHANG Lei2.
PSO Attributes Clustering for Preserving Location Privacy
[J]. Computer Engineering and Applications, 2019, 55(5): 96-104.
|
[3] |
JIA Zongpu, WANG Guanqiong, PENG Weiping, GUO Hairu.
Energy-saving privacy preserving aggregation scheme with integrity verification support
[J]. Computer Engineering and Applications, 2017, 53(5): 116-120.
|
[4] |
LIU Yan, ZHANG Jin, CHEN Jing, YIN Meijuan, ZHANG Weili.
Detection of hype groups based on mining maximum frequent itemsets in Microblogs
[J]. Computer Engineering and Applications, 2017, 53(4): 90-97.
|
[5] |
CHEN Zhengyu1, DAI Hua2, YE Qingqun2, WANG Min2, GE Ningling2.
Survey of secure range query processing in two-tiered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(19): 26-32.
|
[6] |
LI Shiyang, WANG Xiaoming.
Multi-user verifying completeness and integrity encrypted keyword query in cloud storage
[J]. Computer Engineering and Applications, 2016, 52(7): 132-138.
|
[7] |
LIU Weiming1,2, KUAI Hailong1, CHEN Zhigang3, MAO Yimin1,4.
Algorithm based on ordered tree for mining maximal frequent items from uncertain data
[J]. Computer Engineering and Applications, 2015, 51(24): 145-149.
|
[8] |
YIN Shaohong, SHAN Kunyu, FAN Guidan.
Mining algorithm research of data stream maximum frequent itemsets in sliding window
[J]. Computer Engineering and Applications, 2015, 51(22): 145-149.
|
[9] |
DING Bangxu, HUANG Yongqing.
Algorithm of matrix and Prefix-tree for mining frequent itemsets
[J]. Computer Engineering and Applications, 2015, 51(22): 154-157.
|
[10] |
LIU Fengbin1, YUAN Zhiyong1, XIAO Ling2, WANG Huiling2, WANG Gaohua2.
Anxiety and depression factors mining based on improved BUS algorithm
[J]. Computer Engineering and Applications, 2015, 51(18): 126-130.
|
[11] |
WANG Maohua1, HAO Yunli2, CHU Yawei2.
Data encryption method based on privacy preserving
[J]. Computer Engineering and Applications, 2014, 50(23): 87-90.
|
[12] |
WANG Xiaoxia, WANG Zhihe.
Improvement to data streams frequent itemsets mining algorithm WSW-Imp
[J]. Computer Engineering and Applications, 2013, 49(8): 110-113.
|
[13] |
LV Pin1,2,3, ZHONG Luo1, YU Wenbing3, HE Chengwan2,3.
MA-Datafly:k-anonymity approaches for supporting multi-attribute generalization
[J]. Computer Engineering and Applications, 2013, 49(4): 138-140.
|
[14] |
MIAO Miaomiao1, WANG Yuying2.
Research on improvement of Apriori algorithm based on matrix compression
[J]. Computer Engineering and Applications, 2013, 49(1): 159-162.
|
[15] |
LIAO Furong1, WANG Chengliang2.
Algorithm for mining maximal length frequent itemsets based on order FP-tree
[J]. Computer Engineering and Applications, 2012, 48(30): 147-150.
|