[1] |
LI Chengyan, SONG Yue, MA Jintao.
RIOPSO Algorithm for Fuzzy Cloud Resource Scheduling Problem
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(8): 1534-1545.
|
[2] |
MIAO Jiani, YANG Jinlong, CHENG Xiaoxue, GE Hongwei.
Multi-target Tracking Algorithm Based on Motion Information Optimized Correl-ation Filtering
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(7): 1310-1321.
|
[3] |
LYU Haoyuan, YU Lu, ZHOU Xingyu, DENG Xiang.
Review of Semi-supervised Deep Learning Image Classification Methods
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(6): 1038-1048.
|
[4] |
GUO Zijing, LUO Yuchuan, CAI Zhiping, ZHENG Tengfei.
Overview of Privacy Protection Technology of Big Data in Healthcare
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 389-402.
|
[5] |
GAO Ang, LIANG Ying, XIE Xiaojie, WANG Zisen, LI Jintao.
Social Network Information Diffusion Method with Support of Privacy Protection
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 233-248.
|
[6] |
FENG Yani, JIANG Lin, SHAN Rui, LIU Yang, ZHANG Yuan.
Improved Real-Time Dynamic Migration Mechanism of Array Processor Data Cache
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(12): 2028-2038.
|
[7] |
LI Bin, JIANG Jianguo.
Minority Decision: More Secure Voting Mechanism for Distributed Consistency Algorithm
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1693-1701.
|
[8] |
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao.
Trajectory-Differential Privacy-Protection Method with Interest Region
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 59-72.
|
[9] |
DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi.
Method of Privacy Preserving in Dynamic Social Network Data Publication
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458.
|
[10] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[11] |
YANG Gaoming, FANG Xianjin+, XIAO Yafei.
Local Differential Privacy Against Link Attack
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 251-262.
|
[12] |
LIU Fang, HUANG Guangwei, LU Lixia, WANG Hongjuan, WANG Xin.
Robust Target Tracking Algorithm for Adaptive Template Updating
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 83-96.
|
[13] |
ZHENG Haijun, WU Jianguo, LIU Zhengyi.
Cosaliency Detection Based on Similar Matrix and Clustering Consistency
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(9): 1454-1464.
|
[14] |
TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao.
Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729.
|
[15] |
JIANG Jiaxin, HUANG Zhiqiu, MA Weiwei.
Research on Information Flow Control in Service Composition for Privacy Requirement
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(3): 370-379.
|