[1] |
Tianchen QIU, Xiaoying ZHENG, Yongxin ZHU, Songlin FENG.
Federated Learning Architecture for Non-IID Data
[J]. Computer Engineering, 2023, 49(7): 110-117.
|
[2] |
BAI Zhixu, WANG Hengjun.
Adversarial Example Generation Method Based on Improved Genetic Algorithm
[J]. Computer Engineering, 2023, 49(5): 139-149.
|
[3] |
LI Jingwen, ZHAO Kui.
Password Guessing Method Based on Improved PCFG Algorithm
[J]. Computer Engineering, 2023, 49(5): 38-47.
|
[4] |
FANG Zixuan, CAO Suzhen, YAN Junjian, LU Yanfei, HE Qizhi, WANG Caifen.
White-box Traceable CP-ABE Scheme in Smart Healthcare Environment
[J]. Computer Engineering, 2023, 49(3): 142-150.
|
[5] |
ZHENG Desheng, CHEN Jixin, ZHOU Jing, KE Wuping, LU Chao, ZHOU Yong, QIU Qian.
Adversarial Attack Transferability Enhancement Algorithm Based on Input Channel Splitting
[J]. Computer Engineering, 2023, 49(1): 130-137.
|
[6] |
LI Li, DU Huina, LI Tao.
Blockchain Supervisable Privacy Protection Scheme Based on Group Signature and Attribute Encryption
[J]. Computer Engineering, 2022, 48(6): 132-138.
|
[7] |
ZHAO Bingyu, WANG Liusheng, ZHANG Meiling, ZHENG Dong.
Random Plaintext Collision Attack Against AES Algorithm with Reused Masks
[J]. Computer Engineering, 2022, 48(6): 139-145,153.
|
[8] |
ZHAO Beiying, JI Weifeng, WENG Jiang, WU Xuan, LI Yingqi.
Trusted Routing Algorithm Based on Heuristic Q-Learning for FANET
[J]. Computer Engineering, 2022, 48(5): 162-169.
|
[9] |
LI Min, ZHANG Qianying, WANG Guohui, SHI Zhiping, GUAN Yong.
Research on Persistent Storage Method Against Board-Level Physical Attacks
[J]. Computer Engineering, 2022, 48(2): 132-139.
|
[10] |
LI Zheming, ZHANG Hengwei, MA Junqiang, WANG Jindong, YANG Bo.
Adversarial Examples Generation Method Based on Random Translation Transformation
[J]. Computer Engineering, 2022, 48(11): 152-160,183.
|
[11] |
SUN Pengyu, ZHANG Hengwei, TAN Jinglei, LI Chenwei, MA Junqiang, WANG Jindong.
Network Security Defense Decision Method Based on Time Game
[J]. Computer Engineering, 2022, 48(11): 145-151.
|
[12] |
JIN Kejun, YU Hongtao, WU Yiteng, LI Shaomei, CAO Xiaochun.
Poisoning Attack on Graph Convolutional Network Based on Improved Projection Gradient Descent Algorithm
[J]. Computer Engineering, 2022, 48(10): 176-183.
|
[13] |
CONG Mou, ZHANG Ping, WANG NING.
Method of Timing Attack for Linux Against KASLR
[J]. Computer Engineering, 2021, 47(8): 177-182.
|
[14] |
CHEN Xiaonan, HU Jianmin, ZHANG Benjun, CHEN Ailing.
Black Box Adversarial Attack Starting Point Promotion Method Based on Mobility Between Models
[J]. Computer Engineering, 2021, 47(8): 162-169.
|
[15] |
WANG Jingyu, ZHOU Xuejuan.
An Attribute-based Encryption Scheme for Ciphertext Policy that Supports Attribute Revocation
[J]. Computer Engineering, 2021, 47(7): 95-100.
|