[1] |
Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang.
Cyber Security Threat Intelligence Sharing Model Based on Blockchain
[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846.
|
[2] |
Wang Taochun, Jin Xin, Lü Chengmei, Chen Fulong, Zhao Chuanxin.
Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing
[J]. Journal of Computer Research and Development, 2020, 57(11): 2337-2347.
|
[3] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|
[4] |
Zhao Ziming, Liu Fang, Cai Zhiping, Xiao Nong.
Edge Computing: Platforms, Applications and Challenges
[J]. Journal of Computer Research and Development, 2018, 55(2): 327-337.
|
[5] |
Pan Xiao, Chen Weizhang, Sun Yige, Wu Lei.
Continuous Queries Privacy Protection Algorithm Based on Spatial-Temporal Similarity Over Road Networks
[J]. Journal of Computer Research and Development, 2017, 54(9): 2092-2101.
|
[6] |
Niu Xinzheng, Wang Chongyi, Ye Zhijia, She Kun.
An Efficient Association Rule Hiding Algorithm Based on Cluster and Threshold Interval
[J]. Journal of Computer Research and Development, 2017, 54(12): 2785-2796.
|
[7] |
ChenSiyun,LiuTing,ShenChao,SuMan,GaoFeng,XuZhanbo,ShiJiayue,JiaZhanpei.
Smart Home Energy Optimization Based on Cognition of Wearable Devices Sensor Data
[J]. Journal of Computer Research and Development, 2016, 53(3): 704-715.
|
[8] |
Jiang Huowen, Zeng Guosun, Hu Kekun.
A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving
[J]. Journal of Computer Research and Development, 2016, 53(10): 2354-2364.
|
[9] |
Li Pengwei,Fu Jianming,Li Shuanbao, Lü Shaoqing, Sha Letian.
Elastic Mobile Cloud Computing:State of the Art and Security Analysis
[J]. Journal of Computer Research and Development, 2015, 52(6): 1362-1377.
|
[10] |
Pan Xiao, Wu Lei, Hu Zhaojun.
A Privacy Protection Algorithm Based on Network Voronoi Graph over Road Networks
[J]. Journal of Computer Research and Development, 2015, 52(12): 2750-2763.
|
[11] |
He Xianmang, Chen Yindong, Li Dong, Hao Yanni.
Study on Semi-Homogenous Algorithm Based on Ring Generalization
[J]. Journal of Computer Research and Development, 2015, 52(10): 2382-2394.
|
[12] |
Pan Xiao, Hao Xing, and Meng Xiaofeng.
Privacy Preserving Towards Continuous Query in Location-Based Services
[J]. , 2010, 47(1): 121-129.
|
[13] |
Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, and Yin Jian.
A Data Privacy Preservation Method Based on Lossy Decomposition
[J]. , 2009, 46(7): 1217-1225.
|
[14] |
Liu Xin, Wang Xiaoqiang, Zhu Peidong, and Peng Yuxing.
Security Evaluation for Inter-Domain Routing System in the Internet
[J]. , 2009, 46(10): 1669-1677.
|
[15] |
Hu Haiyang, Hu Hua, and Ling Yun.
MAWA: An Efficient and Reliable Web Access Scheme in Mobile Wireless Environments Based on Mobile Agents
[J]. , 2008, 45(4): 636-645.
|