[1] |
LIU Zhuang, GU Kangzheng, TAN Xin, ZHANG Yuan.
Automatic Generation of Code for Heap Spraying Object Manipulation Targeting Kernel Vulnerability Exploitation
[J]. Computer Engineering, 2025, 51(4): 178-187.
|
[2] |
QI Fenglin, SHEN Jiajie, WANG Maoyi, ZHANG Kai, WANG Xin.
Review of Application of Artificial Intelligence in University Informatization
[J]. Computer Engineering, 2025, 51(4): 1-14.
|
[3] |
MAO Jingzheng, HU Xiaorui, XU Gengchen, WU Guodong, SUN Yanbin, TIAN Zhihong.
Review of Application Progress of Digital Twins in Industrial Control Security
[J]. Computer Engineering, 2025, 51(2): 1-17.
|
[4] |
HAN Juan, ZHOU Siqi, PING Ping.
Reversible Data Hiding in Encrypted Image Based on Quadtree Encryption and Adaptive Block Encoding
[J]. Computer Engineering, 2025, 51(2): 202-212.
|
[5] |
WANG Yuanyuan, WANG Shiqian, WANG Han, GUO Zhengbin, HU Xiancheng.
Cross-Border Intelligent Analysis of Energy Emission Based on Vertical Federated Learning
[J]. Computer Engineering, 2025, 51(1): 164-173.
|
[6] |
Qiong SHI, Hui DUAN, Zhibin SHI.
Trusted Task Offloading Scheme Based on Deep Reinforcement Learning
[J]. Computer Engineering, 2024, 50(8): 142-152.
|
[7] |
Qing'an ZHENG, Jiancheng DONG, Liang CHEN, Yingqing RUAN, Jinsong LI, Linbin XU.
Research on Distributed Trusted Data Management and Privacy Protection Technology
[J]. Computer Engineering, 2024, 50(7): 174-186.
|
[8] |
XIONG Shiqiang, HE Daojing, WANG Zhendong, DU Runmeng.
Review of Federated Learning and Its Security and Privacy Protection
[J]. Computer Engineering, 2024, 50(5): 1-15.
|
[9] |
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN.
IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis
[J]. Computer Engineering, 2024, 50(3): 44-51.
|
[10] |
LIU Hangbo, MA Li, LI Yang, MA Dongchao, FU Yingxun.
Obstacle Avoidance Method Using DQN to Classify Obstacles in Unmanned Driving
[J]. Computer Engineering, 2024, 50(11): 380-389.
|
[11] |
YU Xinsheng, ZHU Danjiang, LUO Lunhan.
System Security Analysis Method Based on CLPN
[J]. Computer Engineering, 2024, 50(10): 255-265.
|
[12] |
Sha ZHOU, Guowei SHEN, Chun GUO.
Vulnerability Information Completion Based on Security Knowledge Graph and Reverse Features
[J]. Computer Engineering, 2024, 50(1): 145-155.
|
[13] |
Zhaoxian XIE, Xingmin ZOU, Wenjing ZHANG.
High-Efficient Parameter-Pruning Algorithm of Decision Tree for Large Dataset
[J]. Computer Engineering, 2024, 50(1): 156-165.
|
[14] |
Baohua HUANG, Huiying ZHENG, Xi QU, Ningjiang CHEN.
Efficient Storage Access Control Scheme for Alliance Chain
[J]. Computer Engineering, 2023, 49(8): 37-45.
|
[15] |
Changhong YU, Ya LU, Haixin WANG, Ming GAO.
Traffic Classification Algorithm for IoT Device Based on Sliding Time Window
[J]. Computer Engineering, 2023, 49(7): 259-268.
|