[1] |
Liu Haijiao, Ma Huifang, Zhao Qiqi, Li Zhixin.
Target Community Detection with User Interest Preferences and Influence
[J]. Journal of Computer Research and Development, 2021, 58(1): 70-82.
|
[2] |
Yue Guangxue, Dai Yasheng, Yang Xiaohui, Liu Jianhua, You Zhenxu, Zhu Youkang.
Model of Trusted Cooperative Service for Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(5): 1080-1102.
|
[3] |
Ma Yi, Guo Xingli, Sun Yutong, Yuan Qianqian, Ren Yang, Duan Ran, Gao Lin.
Prediction of Disease Associated Long Non-Coding RNA Based on HeteSim
[J]. Journal of Computer Research and Development, 2019, 56(9): 1889-1896.
|
[4] |
Yu Yaxin, Wang Lei.
An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network
[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311.
|
[5] |
Zhang Qikun, Gan Yong, Wang Ruifang, Zheng Jiamin, Tan Yu’an.
Inter-Cluster Asymmetric Group Key Agreement
[J]. Journal of Computer Research and Development, 2018, 55(12): 2651-2663.
|
[6] |
Liu Yong, Xie Shengnan, Zhong Zhiwei, Li Jinbao, Ren Qianqian.
Topic-Interest Based Influence Maximization Algorithm in Social Networks
[J]. Journal of Computer Research and Development, 2018, 55(11): 2406-2418.
|
[7] |
Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia3.
Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server
[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489.
|
[8] |
Deng Xiaoheng, Cao Dejuan, Pan Yan, Shen Hailan, Chen Zhigang.
An Optimized Credit Distribution Model in Social Networks with Time-Delay Constraint
[J]. Journal of Computer Research and Development, 2017, 54(2): 382-393.
|
[9] |
Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui.
Security Analysis of Lightweight Block Cipher ESF
[J]. Journal of Computer Research and Development, 2017, 54(10): 2224-2231.
|
[10] |
Wen Yingyou, Wang Shaopeng, Zhao Hong.
The Maximal Regular Patterns Mining Algorithm Based on Landmark Window over Data Stream
[J]. Journal of Computer Research and Development, 2017, 54(1): 94-110.
|
[11] |
Yu Yonghong, Gao Yang,Wang Hao.
A Ranking Based Poisson Matrix Factorization Model for Point-of-Interest Recommendation
[J]. Journal of Computer Research and Development, 2016, 53(8): 1651-1663.
|
[12] |
Li Xiaokang, Zhang Xi, Sun Hao,Sun Guangzhong.
Influence Maximization Across Multi-Channels in Social Network
[J]. Journal of Computer Research and Development, 2016, 53(8): 1709-1718.
|
[13] |
Zhang Xiaojian, Shao Chao, Meng Xiaofeng.
Accurate Histogram Release under Differential Privacy
[J]. Journal of Computer Research and Development, 2016, 53(5): 1106-1117.
|
[14] |
Guo Hong, Li Yan, An Hengbin.
A Parallel Communication Algorithm in Supersonic COIL’s Calculations Using Multiblock Mesh
[J]. Journal of Computer Research and Development, 2016, 53(5): 1166-1172.
|
[15] |
LiJin,YueKun,ZhangDehai,LiuWeiyi.
Robust Influence Blocking Maximization in Social Networks
[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610.
|