[1] |
Fang Yuan, Wang Lizhen, Wang Xiaoxuan, Yang Peizhong.
Spatial Occupancy-Based Dominant Co-Location Patterns Mining
[J]. Journal of Computer Research and Development, 2022, 59(2): 264-281.
|
[2] |
Zhang Shuyi Xi Zhengjun.
Quantum Hypothesis Testing Mutual Information
[J]. Journal of Computer Research and Development, 2021, 58(9): 1906-1914.
|
[3] |
Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing.
A Consistent Hash Data Placement Algorithm Based on Stripe
[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903.
|
[4] |
Wu Zhijun, Zhang Rudan, Yue Meng.
A Method for Joint Detection of Attacks in Named Data Networking
[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582.
|
[5] |
Liu Yu, Guo Chan, Feng Shuyao, Zhou Ke, Xiao Zhili.
Content Sifting Storage Mechanism for Cross-Modal Image and Text Data Based on Semantic Similarity
[J]. Journal of Computer Research and Development, 2021, 58(2): 338-355.
|
[6] |
Wei Hongru Huang Jingyi.
SOTS: A Hash Function-Based Shorter Post-Quantum Digital Signature Scheme
[J]. Journal of Computer Research and Development, 2021, 58(10): 2300-2309.
|
[7] |
Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei.
One-Time Chameleon Hash Function and Its Application in Redactable Blockchain
[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318.
|
[8] |
Zhang Yong, Chen Rongrong, Zhang Jing.
Safe Tri-training Algorithm Based on Cross Entropy
[J]. Journal of Computer Research and Development, 2021, 58(1): 60-69.
|
[9] |
Liu Xingbo, Nie Xiushan, Yin Yilong.
Mutual Linear Regression Based Supervised Discrete Cross-Modal Hashing
[J]. Journal of Computer Research and Development, 2020, 57(8): 1707-1714.
|
[10] |
Zhuo Junbao, Su Chi, Wang Shuhui, Huang Qingming.
Min-Entropy Transfer Adversarial Hashing
[J]. Journal of Computer Research and Development, 2020, 57(4): 888-896.
|
[11] |
Tian Junfeng, Wang Yanbiao.
Causal-Pdh: Causal Consistency Model for NoSQL Distributed Data Storage Using HashGraph
[J]. Journal of Computer Research and Development, 2020, 57(12): 2703-2716.
|
[12] |
He Zhouyu, Feng Xupeng, Liu Lijun, Huang Qingsong.
Deep Highly Interrelated Hashing for Fast Image Retrieval
[J]. Journal of Computer Research and Development, 2020, 57(11): 2375-2388.
|
[13] |
Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo.
A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks
[J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220.
|
[14] |
Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng.
Optimization of Library Function Disposing in Dynamic Binary Translation
[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791.
|
[15] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|