[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[3] |
JIANG Kui, QIU Yuandong, ZHENG Haocheng.
ICMPv6 DDoS Attack Detection Method Based on Information Entropy and LSTM
[J]. Computer Engineering and Applications, 2021, 57(21): 148-154.
|
[4] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[5] |
XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli.
Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake
[J]. Computer Engineering and Applications, 2021, 57(2): 113-118.
|
[6] |
ZHANG Xueting, CHENG Hua, FANG Yiquan.
Prediction of Co-authorship Based on Meta-Path and Node Attributes
[J]. Computer Engineering and Applications, 2021, 57(2): 164-169.
|
[7] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[8] |
TIAN Yang, CHEN Zhigang, SONG Xinxia, LI Tianming.
Overview of Blockchain Application in Supply Chain Management
[J]. Computer Engineering and Applications, 2021, 57(19): 70-83.
|
[9] |
ZHANG Jun, LIAO Xuehua, YU Xuling, LEI Meng.
Research on Realizing Relational Database In-Memory Storage Model
[J]. Computer Engineering and Applications, 2021, 57(19): 123-128.
|
[10] |
CHEN Heng, QI Ruihua, ZHU Yi, YANG Chen, GUO Xu, WANG Weimei.
Knowledge Graph Completion Method for Semantic Hierarchies of Spherical Coordinate Modeling
[J]. Computer Engineering and Applications, 2021, 57(15): 101-108.
|
[11] |
XIANG Yixuan, JIANG He, PAN Pinchen, SUN Conghui.
Study on [K]-means Clustering Algorithm of Quadratic Power Coupling
[J]. Computer Engineering and Applications, 2021, 57(14): 95-102.
|
[12] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[13] |
WANG Hong, LIN Haizhou, LU Linyan.
Knowledge Graph Inference Algorithm Based on Att_GCN Model
[J]. Computer Engineering and Applications, 2020, 56(9): 183-189.
|
[14] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[15] |
CHEN Heng, LI Guanyu, QI Ruihua, WANG Weimei.
Capsule Network’s Application in Knowledge Graph Completion
[J]. Computer Engineering and Applications, 2020, 56(8): 110-116.
|