[1] |
ZHOU Guangrui, XU Shulin, GUO Yiyun, LU Faming, YUE Hao.
Estimation of Least-Cost Planning Sequence for Labeled Petri Nets
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(7): 1350-1358.
|
[2] |
GUO Zijing, LUO Yuchuan, CAI Zhiping, ZHENG Tengfei.
Overview of Privacy Protection Technology of Big Data in Healthcare
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 389-402.
|
[3] |
GAO Ang, LIANG Ying, XIE Xiaojie, WANG Zisen, LI Jintao.
Social Network Information Diffusion Method with Support of Privacy Protection
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 233-248.
|
[4] |
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao.
Trajectory-Differential Privacy-Protection Method with Interest Region
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 59-72.
|
[5] |
DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi.
Method of Privacy Preserving in Dynamic Social Network Data Publication
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458.
|
[6] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[7] |
YANG Gaoming, FANG Xianjin+, XIAO Yafei.
Local Differential Privacy Against Link Attack
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 251-262.
|
[8] |
TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao.
Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729.
|
[9] |
LI Xiangdong, ZHANG Shaobo, GUO Min, WANG Guojun.
Location Privacy Protection Method Based on Grid
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1258-1268.
|
[10] |
SUN Xiaoling.
Bidirectional Fuzzy Fault Reasoning Algorithm of Intuitionistic Fuzzy Petri Net
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 1006-1013.
|
[11] |
LI Denghui, JIAO Jian, CHEN Xin, SONG Yapeng, XIAO Qing.
Research on Modeling Method of Android Malware Based on Colored-Petri Nets
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(1): 99-105.
|
[12] |
ZHAO Fang, FANG Xianwen, FANG Huan.
Analysis Method of the Smallest Change Region with Dynamic Slice of Petri Nets
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 516-523.
|
[13] |
HE Yifan, HUANG Zhiqiu, SUN Yi.
Pivot Nested Transaction Model for Web Service Composition
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(8): 926-934.
|
[14] |
DAI Fei, MO Qi, LIN Leilei, ZHU Rui, LI Tong, XIE Zhongwen.
Collaboration Business Process Modeling Based on Petri Nets and Pi Calculus
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(6): 692-706.
|
[15] |
YAN Cairong, ZHANG Yangshun, XU Guangwei.
Crowdsourcing Entity Resolution with Privacy Protection
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(7): 802-811.
|