[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[3] |
XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli.
Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake
[J]. Computer Engineering and Applications, 2021, 57(2): 113-118.
|
[4] |
ZHANG Kehua, CHENG Weiqing.
Differential Privacy Clustering Algorithm Based on Spatial Dynamic Partition
[J]. Computer Engineering and Applications, 2021, 57(2): 97-103.
|
[5] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[6] |
HOU Yao, TAO Yang, YANG Li, XIONG Lian.
Personal Trajectory Information Protection Based on Differential Privacy Mechanism
[J]. Computer Engineering and Applications, 2020, 56(9): 106-110.
|
[7] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[8] |
ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui.
Semantic Diversity Location Privacy Protection Method in Road Network Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 102-108.
|
[9] |
LIANG Xiaobing, XU Bin, ZHAI Feng, SHEN Bo.
Power Consumption Big Data Privacy Protection Method Based on Attribute Classification
[J]. Computer Engineering and Applications, 2020, 56(5): 93-100.
|
[10] |
ZHANG Siliang, LING Jie, CHEN Jiahui.
Traceable Blockchain Ledger Privacy Protection Scheme
[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
|
[11] |
YANG Ting, PANG Xiaoqiong, CHEN Wenjun, WANG Yunting, LIU Tianye.
Digital Rights Management Supporting Privacy Protection in Blockchain Environment
[J]. Computer Engineering and Applications, 2020, 56(23): 109-115.
|
[12] |
GAO Qi, LI Hongjiao.
Differential Private Data Protection with Period Sensitivity for Smart Meters
[J]. Computer Engineering and Applications, 2020, 56(20): 73-81.
|
[13] |
WANG Jiahe, WEI Songjie, WU Chao.
Android Apps Traffic Behavior Obfuscation Method Based on Differential Privacy Protection
[J]. Computer Engineering and Applications, 2020, 56(2): 68-75.
|
[14] |
PIAO Yangheran, CUI Xiaohui.
Review on User Privacy Inference and Protection in Social Networks
[J]. Computer Engineering and Applications, 2020, 56(19): 1-12.
|
[15] |
MA Yuanyuan, LIU Zhoubin, WANG Zixiang.
Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario
[J]. Computer Engineering and Applications, 2020, 56(17): 115-120.
|