[1] |
ZHANG Jun.
SCVerify: Verification of Software Implementation Against Power Side-Channel Attacks
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(6): 1074-1083.
|
[2] |
GUO Fan, FAN Weiwei.
Analysis and Verification on SQLIA Vulnerability for Java EE Programs
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 270-283.
|
[3] |
CHEN Qinkuang, CHEN Ke, WU Sai, SHOU Lidan, CHEN Gang.
Research About Knowledge Graph Completion Based on Active Learning
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(5): 769-782.
|
[4] |
JIA Dayu, XIN Junchang, WANG Zhiqiong, GUO Wei, WANG Guoren.
Storage Capacity Scalable Model for Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(4): 525-535.
|
[5] |
ZHU Yi, HUANG Zhiqiu, ZHOU Hang.
Formal Method for Verifying BPEL Model Used by Functional Programming Language
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 185-196.
|
[6] |
DAI Hua, WANG Min, YI Xun, YANG Geng, YE Qingqun.
Survey of Secure MAX/MIN Query Processing in Wireless Sensor Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1191-1203.
|
[7] |
WU Zhipeng, HU Jun, CHEN Song, SHI Jiaojie.
Safety Verification Methodology of Embedded System Based on AltaRica Model
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(1): 24-36.
|
[8] |
QIN Xiaoqian, TAN Xiaoyang, CHEN Songcan.
Kinship Verification Through Large Margin Bilinear Classifier
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 524-532.
|
[9] |
HU Jun, MA Jinjing, LIU Xue, CHENG Zhen, SHI Jiaojie, HUANG Zhiqiu.
Model-Driven Reconfiguration Information Verification for Safety-Critical Systems
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(4): 385-402.
|
[10] |
WANG Dan, CHANG Jiansheng, ZHAO Wenbing.
Verification Model for Trustworthiness of Interaction between Software Components with Pi-calculus
[J]. Journal of Frontiers of Computer Science and Technology, 2012, 6(5): 419-429.
|
[11] |
JIANG Caoqing, YING Shi, WEN Jing, JIA Xiangyang, GUAN Hua.
Verification of Termination for Exception Handling Process in Service-Oriented Software
[J]. Journal of Frontiers of Computer Science and Technology, 2012, 6(3): 208-220.
|
[12] |
HE Yanxiang1,2+, WU Wei2, LIU Tao2, LI Qingan2, CHEN Yong2, HU Minghao2, LIU Jianbo2,SHI Qian2.
Theory and Key Implementation Techniques of Trusted Compiler: A Survey
[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(1): 1-22.
|
[13] |
YANG Pingping1,2, DU Xiaoyong1,2+, WANG Jieping1,2.
Integrity Verification Based on Bucket Index in DAS Model
[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(5): 426-435.
|
[14] |
LI Xuesi+, MAO Xinjun, DONG Menggao .
Agent Entity Self-evolving Software Technique and Supporting Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(4): 312-323.
|
[15] |
LI Jun+, YUAN Aidong, GAO Jiangang.
The design and verification of a broadcast-based cache coherence protocol
[J]. Journal of Frontiers of Computer Science and Technology, 2008, 2(5): 545-552.
|