[1] |
Han Mu, Yang Chen, Hua Lei, Liu Shuai, Ma Shidian.
Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing
[J]. Journal of Computer Research and Development, 2022, 59(4): 781-795.
|
[2] |
Li Xin, Li Zhemin, Wei Juhui, Yang Yating, Wang Hongxia.
Cross-Domain Adaptive Learning Model Based on Feature Separation
[J]. Journal of Computer Research and Development, 2022, 59(1): 105-117.
|
[3] |
Wang Leixia Meng Xiaofeng.
ESA: A Novel Privacy Preserving Framework
[J]. Journal of Computer Research and Development, 2022, 59(1): 144-171.
|
[4] |
Zhou Peng, Wu Yanjun, Zhao Chen.
Identify Linux Security Vulnerability Fix Patches Automatically
[J]. Journal of Computer Research and Development, 2022, 59(1): 197-208.
|
[5] |
Pan Shijie, Gao Fei, Wan Linchun, Qin Sujuan, Wen Qiaoyan.
Quantum Algorithm for Spectral Regression
[J]. Journal of Computer Research and Development, 2021, 58(9): 1835-1842.
|
[6] |
Ma Yang, Liu Zeyi, Liang Xingxing, Cheng Guangquan, Yang Fangjie, Cheng Qing, Liu Zhong.
Gene Sequence Representation Learning Based on Virus Transmission Network
[J]. Journal of Computer Research and Development, 2021, 58(8): 1642-1654.
|
[7] |
Xiao Tianming, Guan Jianbo, Jian Songlei, Ren Yi, Zhang Jianfeng, Li Bao.
Software Vulnerability Detection Method Based on Code Property Graph and Bi-GRU
[J]. Journal of Computer Research and Development, 2021, 58(8): 1668-1685.
|
[8] |
Shao Tianzhu, Wang Xiaoliang, Chen Wenlong, Tang Xiaolan, Xu Min.
Design of an Intelligent Routing Algorithm to Reduce Routing Flap
[J]. Journal of Computer Research and Development, 2021, 58(6): 1261-1274.
|
[9] |
Sun Cong, Li Zhankui, Chen Liang, Ma Jianfeng, Qiao Xinbo.
Digital Currency Features Oriented Fine-Grained Code Injection Attack Detection
[J]. Journal of Computer Research and Development, 2021, 58(5): 1035-1044.
|
[10] |
Li Teng, Qiao Wei, Zhang Jiawei, Gao Yiyang, Wang Shenao, Shen Yulong, Ma Jianfeng.
Privacy-Preserving Network Attack Provenance Based on Graph Convolutional Neural Network
[J]. Journal of Computer Research and Development, 2021, 58(5): 1006-1020.
|
[11] |
Wang Jialai, Zhang Chao, Qi Xuyan, Rong Yi.
A Survey of Intelligent Malware Detection on Windows Platform
[J]. Journal of Computer Research and Development, 2021, 58(5): 977-994.
|
[12] |
Ren Zezhong, Zheng Han, Zhang Jiayuan, Wang Wenjie, Feng Tao, Wang He, Zhang Yuqing.
A Review of Fuzzing Techniques
[J]. Journal of Computer Research and Development, 2021, 58(5): 944-963.
|
[13] |
Wang Ye, Chen Junwu, Xia Xin, Jiang Bo.
Intelligent Requirements Elicitation and Modeling: A Literature Review
[J]. Journal of Computer Research and Development, 2021, 58(4): 683-705.
|
[14] |
Wu Zongyou, Bai Kunlong, Yang Linrui, Wang Yiqi, Tian Yingjie.
Review on Text Mining of Electronic Medical Record
[J]. Journal of Computer Research and Development, 2021, 58(3): 513-527.
|
[15] |
Chen Jinyin, Chen Yipeng, Chen Yiming, Zheng Haibin, Ji Shouling, Shi Jie, Cheng Yao.
Fairness Research on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(2): 264-280.
|