[1] |
QI Fenglin, SHEN Jiajie, WANG Maoyi, ZHANG Kai, WANG Xin.
Review of Application of Artificial Intelligence in University Informatization
[J]. Computer Engineering, 2025, 51(4): 1-14.
|
[2] |
YANG Linfeng, HUANG Zheng, XU Yan, DING Zhijun.
Modeling and Detection of Blockchain Smart Contract Attackers Based on Petri Nets
[J]. Computer Engineering, 2025, 51(4): 15-26.
|
[3] |
LIU Zhuang, GU Kangzheng, TAN Xin, ZHANG Yuan.
Automatic Generation of Code for Heap Spraying Object Manipulation Targeting Kernel Vulnerability Exploitation
[J]. Computer Engineering, 2025, 51(4): 178-187.
|
[4] |
MAO Jingzheng, HU Xiaorui, XU Gengchen, WU Guodong, SUN Yanbin, TIAN Zhihong.
Review of Application Progress of Digital Twins in Industrial Control Security
[J]. Computer Engineering, 2025, 51(2): 1-17.
|
[5] |
WU Ruolan, CHEN Yuling, DOU Hui, ZHANG Yangwen, LONG Zhong.
Privacy Preserving Algorithm Using Federated Learning Against Attacks
[J]. Computer Engineering, 2025, 51(2): 179-187.
|
[6] |
HAN Juan, ZHOU Siqi, PING Ping.
Reversible Data Hiding in Encrypted Image Based on Quadtree Encryption and Adaptive Block Encoding
[J]. Computer Engineering, 2025, 51(2): 202-212.
|
[7] |
CHEN Xianyi, DING Sizhe, WANG Kang, YAN Leiming, FU Zhangjie.
An Watermarking Framework of Active Protection Model for Secure Federated Learning
[J]. Computer Engineering, 2025, 51(1): 138-147.
|
[8] |
XIAO Chaoen, LI Zifan, ZHANG Lei, WANG Jianxin, QIAN Siyuan.
Differential Cryptanalysis Based on Transformer Model and Attention Mechanism
[J]. Computer Engineering, 2025, 51(1): 156-163.
|
[9] |
WANG Yuanyuan, WANG Shiqian, WANG Han, GUO Zhengbin, HU Xiancheng.
Cross-Border Intelligent Analysis of Energy Emission Based on Vertical Federated Learning
[J]. Computer Engineering, 2025, 51(1): 164-173.
|
[10] |
Yunhe CUI, Jianpeng ZHAO, Hongzhen YANG, Xianchao LI.
Curve Decision Fusion-Based Saturation Attack Detection Method in SDN
[J]. Computer Engineering, 2024, 50(8): 123-132.
|
[11] |
Qiong SHI, Hui DUAN, Zhibin SHI.
Trusted Task Offloading Scheme Based on Deep Reinforcement Learning
[J]. Computer Engineering, 2024, 50(8): 142-152.
|
[12] |
XIONG Shiqiang, HE Daojing, WANG Zhendong, DU Runmeng.
Review of Federated Learning and Its Security and Privacy Protection
[J]. Computer Engineering, 2024, 50(5): 1-15.
|
[13] |
LIANG Songlin, LIN Wei, WANG Jue, YANG Qing.
Research on Network Malicious Traffic Detection for Post-Exploitation Attack Behavior
[J]. Computer Engineering, 2024, 50(5): 128-138.
|
[14] |
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN.
IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis
[J]. Computer Engineering, 2024, 50(3): 44-51.
|
[15] |
Shuaiwei LIU, Zhi LI, Guomei WANG, Li ZHANG.
Adversarial Example Generation Algorithm Based on Transformer and GAN
[J]. Computer Engineering, 2024, 50(2): 180-187.
|