[1] |
Zhu Suxia, Wang Lei, Sun Guanglu.
A Perturbation Mechanism for Classified Transformation Satisfying Local Differential Privacy
[J]. Journal of Computer Research and Development, 2022, 59(2): 430-439.
|
[2] |
Wang Leixia Meng Xiaofeng.
ESA: A Novel Privacy Preserving Framework
[J]. Journal of Computer Research and Development, 2022, 59(1): 144-171.
|
[3] |
Hong Jinxin, Wu Yingjie, Cai Jianping, Sun Lan.
Differentially Private High-Dimensional Binary Data Publication via Attribute Segmentation
[J]. Journal of Computer Research and Development, 2022, 59(1): 182-196.
|
[4] |
Sun Yan, Ji Weifeng, Weng Jiang, Zhao Beiying.
Optimal Strategy of Moving Target Defense Based on Differential Game
[J]. Journal of Computer Research and Development, 2021, 58(8): 1789-1800.
|
[5] |
Wang Huijiao, Cong Peng, Jiang Hua, Wei Yongzhuang.
Security Analysis of SIMON32/64 Based on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(5): 1056-1064.
|
[6] |
Zhang Xiaojian, Xu Yaxin, Fu Nan, Meng Xiaofeng.
Towards Private Key-Value Data Collection with Histogram
[J]. Journal of Computer Research and Development, 2021, 58(3): 624-637.
|
[7] |
Zhang Zhongya, Wu Wenling, Zou Jian.
Quantum Differential Collision Key Recovery Attack of Multi-Round EM Structure
[J]. Journal of Computer Research and Development, 2021, 58(12): 2811-2818.
|
[8] |
Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui.
Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation
[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363.
|
[9] |
Wu Wanqing, Zhao Yongxin, Wang Qiao, Di Chaofan.
A Safe Storage and Release Method of Trajectory Data Satisfying Differential Privacy
[J]. Journal of Computer Research and Development, 2021, 58(11): 2430-2443.
|
[10] |
Zhao Ziting, Xu Yin, Song Xiangfu, Jiang Han.
A Multi-Pattern Hiding Dynamic Symmetric Searchable Encryption Based on Differential Privacy
[J]. Journal of Computer Research and Development, 2021, 58(10): 2287-2300.
|
[11] |
Zhang Xiaojian, Fu Nan, Meng Xiaofeng.
Towards Spatial Range Queries Under Local Differential Privacy
[J]. Journal of Computer Research and Development, 2020, 57(4): 847-858.
|
[12] |
Wang Bin, Zhang Lei, Zhang Guoyin.
A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme
[J]. Journal of Computer Research and Development, 2020, 57(3): 616-630.
|
[13] |
Liu Junxu, Meng Xiaofeng.
Survey on Privacy-Preserving Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362.
|
[14] |
Huang Haiping, Zhang Dongjun, Wang Kai, Zhu Yikai, Wang Ruchuan.
Weighted Large-Scale Social Network Data Privacy Protection Method
[J]. Journal of Computer Research and Development, 2020, 57(2): 363-377.
|
[15] |
Liu Shifang, Zhao Yonghua, Yu Tianyu, Huang Rongfeng.
Efficient Implementation of Parallel Symmetric Matrix Tridiagonalization Algorithm on GPU Cluster
[J]. Journal of Computer Research and Development, 2020, 57(12): 2635-2647.
|