[1] |
ZHAO Linsuo, MA Ruiqiang, JIANG Tian, SONG Baoyan,PAN Yishan.
Adaptive Early Warning Method for Streaming Big Data Events Based on Two-Stage Regression
[J]. Computer Engineering and Applications, 2021, 57(7): 88-94.
|
[2] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[3] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[4] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[5] |
XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli.
Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake
[J]. Computer Engineering and Applications, 2021, 57(2): 113-118.
|
[6] |
LI Sha, LIN Hui.
Spatio-Temporal Modelling and Prediction Combined with MLR and ARIMA Model
[J]. Computer Engineering and Applications, 2021, 57(13): 276-282.
|
[7] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[8] |
ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui.
Semantic Diversity Location Privacy Protection Method in Road Network Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 102-108.
|
[9] |
XU Bin, LIANG Xiaobing, SHEN Bo.
Non-interactive Queries Differential Privacy Protection Model in Big Data Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 116-121.
|
[10] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[11] |
ZHANG Siliang, LING Jie, CHEN Jiahui.
Traceable Blockchain Ledger Privacy Protection Scheme
[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
|
[12] |
YANG Ting, PANG Xiaoqiong, CHEN Wenjun, WANG Yunting, LIU Tianye.
Digital Rights Management Supporting Privacy Protection in Blockchain Environment
[J]. Computer Engineering and Applications, 2020, 56(23): 109-115.
|
[13] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
[14] |
WANG Jiahe, WEI Songjie, WU Chao.
Android Apps Traffic Behavior Obfuscation Method Based on Differential Privacy Protection
[J]. Computer Engineering and Applications, 2020, 56(2): 68-75.
|
[15] |
PIAO Yangheran, CUI Xiaohui.
Review on User Privacy Inference and Protection in Social Networks
[J]. Computer Engineering and Applications, 2020, 56(19): 1-12.
|