Author:
Xiang Sheng,He Yigang,Chang Liuchen,Wu Kehan,Zhang Chaolong
Publisher
Springer International Publishing
Reference33 articles.
1. Rastaghi, R.: New approach for CCA2-secure post-quantum cryptosystem using knapsack problem. Comput. Sci. (2012)
2. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)
3. Qu, Z., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. Chin. Commun. 13(7), 108–116 (2016)
4. Xue, Y., Jiang, J., Zhao, B., Ma, T.: A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft Comput. (2017)
5. Holland, J.: Adaptation in Natural and Artificial System. University of Michigan Press, Ann Arbor (1975)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献