[1] |
Lichuan MA, Jiayi PENG, Qingqi PEI, Haojin ZHU.
Efficient privacy-preserving decision tree classification protocol
[J]. Journal on Communications, 2021, 42(8): 80-89.
|
[2] |
Hongfa DING,Changgen PENG,Youliang TIAN,Shuwen XIANG.
Privacy risk adaptive access control model via evolutionary game
[J]. Journal on Communications, 2019, 40(12): 9-20.
|
[3] |
Wei LIU,Shu XIONG,Wei DU,Wei WANG.
Research on Cloudlet selection strategy for data streaming applications in mobile cloud environment
[J]. Journal on Communications, 2019, 40(1): 87-101.
|
[4] |
Li LI,Guozhen SHI,Kui GENG,Xiuze DONG,Fenghua LI.
Scheduling algorithm for stochastic job stream cipher service based on load balancing
[J]. Journal on Communications, 2018, 39(6): 11-19.
|
[5] |
Yong ZENG,Lingjie ZHOU,Zhongyuan JIANG,Zhihong LIU,Jianfeng MA.
Security analysis of weighted network anonymity based on singular value decomposition
[J]. Journal on Communications, 2018, 39(5): 23-33.
|
[6] |
Hui LIN,Mengyang YU,Youliang TIAN,Yijie HUANG.
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
[J]. Journal on Communications, 2018, 39(5): 85-93.
|
[7] |
Lingbo WEI,Xiaobing FENG,Chi ZHANG,Hualong SHENG,Nenghai YU.
Network function outsourcing system based on prefix-preserving encryption
[J]. Journal on Communications, 2018, 39(4): 159-166.
|
[8] |
Yihan YU,Yu FU,Xiaoping WU.
Stochastic gradient descent algorithm preserving differential privacy in MapReduce framework
[J]. Journal on Communications, 2018, 39(1): 70-77.
|
[9] |
Zhi-qiang WU,Ken-li LI,Hui ZHENG.
Efficient and scalable architecture for searchable symmetric encryption
[J]. Journal on Communications, 2017, 38(8): 79-93.
|
[10] |
Hao WANG,Zheng-quan XU,Li-zhi XIONG,Tao WANG.
CLM:differential privacy protection method for trajectory publishing
[J]. Journal on Communications, 2017, 38(6): 85-96.
|
[11] |
Wen-jun XIONG,Zheng-quan XU,Hao WANG.
Privacy level evaluation of differential privacy for time series based on filtering theory
[J]. Journal on Communications, 2017, 38(5): 172-181.
|
[12] |
Tao YOU,Ting-feng LI,Cheng-lie DU,Dong ZHONG,Yi-an ZHU.
Data stream prediction based on rule antecedent occurrence tree matching
[J]. Journal on Communications, 2017, 38(12): 98-108.
|
[13] |
Xiao-qian LIU,Qian-mu LI.
Differentially private data release based on clustering anonymization
[J]. Journal on Communications, 2016, 37(5): 125-129.
|
[14] |
Hong-cheng LI,Xiao-ping WU,Yan CHEN.
k-means clustering method preserving differential privacy in MapReduce framework
[J]. Journal on Communications, 2016, 37(2): 125-131.
|
[15] |
Li-bing WU,Yong XIE,Yu-bo ZHANG.
Efficient and secure message authentication scheme for VANET
[J]. Journal on Communications, 2016, 37(11): 1-10.
|