[1] |
ZHANG Liqun, PAN Zulie, HUANG Hui, WANG Ruipeng, LI Yang.
Research on Automatic Verification Method of Tcache Poisoning Heap Vulnerability Based on Symbolic Execution
[J]. Computer Engineering, 2023, 49(6): 24-33.
|
[2] |
ZHANG Xiaojun, LIU Qing, ZHENG Shuang, WANG Xin, XUE Jingting, WANG Shixiong.
Verifiable Cloud Data Sharing Scheme that Supports Privacy Protection
[J]. Computer Engineering, 2023, 49(3): 49-57.
|
[3] |
YANG Zhoufan, HAN Lin, LI Bingyang, XIE Jingming, HAN Pu, LIU Yongjie.
Large-Scale Pipeline Network Simulation Based on “Songshan” Supercomputer System
[J]. Computer Engineering, 2022, 48(9): 155-161.
|
[4] |
YANG Ke, ZHANG Fan, GUO Wei, ZHAO Bo, MU Qing.
A Method for Solving the Metadata Randomness Problem of Mimic Storage
[J]. Computer Engineering, 2022, 48(2): 140-146,155.
|
[5] |
LI Min, ZHANG Qianying, WANG Guohui, SHI Zhiping, GUAN Yong.
Research on Persistent Storage Method Against Board-Level Physical Attacks
[J]. Computer Engineering, 2022, 48(2): 132-139.
|
[6] |
YANG Tao, ZHENG Quan, XU Zhenghuan, SHI Qianbao, PENG Siwei.
Research on Strong Cache Consistency Under Generic Cache Replacement Strategy
[J]. Computer Engineering, 2022, 48(12): 180-188,195.
|
[7] |
HE Xiaobin, GAO Jie, XIAO Wei, CHEN Qi, LIU Xin, CHEN Zuoning.
Research on Application-Transparent Supercomputing Multi-tier Storage Acceleration Technology
[J]. Computer Engineering, 2022, 48(12): 1-8.
|
[8] |
LIU Xin, HU Xiangyu, XU Gang, CHEN Xiubo.
Oblivious Transfer Protocol for Confidentiality Query of Blockchain Data
[J]. Computer Engineering, 2022, 48(10): 13-20.
|
[9] |
CONG Mou, ZHANG Ping, WANG NING.
Method of Timing Attack for Linux Against KASLR
[J]. Computer Engineering, 2021, 47(8): 177-182.
|
[10] |
WEI Xiuran, WANG Feng.
Data Replication Strategy of Cloud Storage Based on Coordinator and Genetic Algorithm
[J]. Computer Engineering, 2021, 47(8): 124-130,139.
|
[11] |
ZHENG Xiaomin, LI Xiangyu.
Efficient Software Implementation of Random Forest Gesture Recognition Algorithm in Embedded System
[J]. Computer Engineering, 2021, 47(7): 218-225.
|
[12] |
NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni.
Data Sharing Scheme of Electronic Medical Record Based on Proxy Re-Encryption
[J]. Computer Engineering, 2021, 47(6): 164-171.
|
[13] |
ZHANG Xiaojun, ZHANG Jingwei, HUANG Chao, TANG Wei.
Verifiable Statistical Analysis Scheme for Encrypted Medical Data in Cloud Storage
[J]. Computer Engineering, 2021, 47(6): 32-37,43.
|
[14] |
LI Haotian, SHENG Yiqiang.
Low-Latency Storage Algorithm for Edge Networks in Consistency Scenarios
[J]. Computer Engineering, 2021, 47(5): 176-180,188.
|
[15] |
JIAO Tong, CHEN Lingling, AN Xin, LI Jianhua.
Reuse Information-based Dynamic Bypass Policy for Non-Volatile Cache
[J]. Computer Engineering, 2021, 47(4): 158-165.
|