Home > Papers > Other-Subjects-of-Computer-Science-and-Technology

 
  There are 22 papers published in subject: > since this site started.
  Results per page: 22 Total, 3 Pages | 1 2 3 Next > Last >>
Select Subject
   All (8835)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. Classification of security vulnerability exploit codes using large language models
  Huang Linhui,He Yongzhong,Yin Min,Li Chao,Hou Lu,Wang Xiaonan,Guo Yaoyao
  Computer Science and Technology 26 February 2024
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
  Shijie Deng,Gaobo Yang,Wen Dong,Ming Xia
  Computer Science and Technology 12 May 2021
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Efficient Decentralized Ciphertext-Policy Attribute Based Encryption With Fine-Grained Revocation
  Dong Wen,Yang Gaobo
  Computer Science and Technology 12 May 2020
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. A Multiple Images Hiding Scheme Based on Compressive Sensing
  WANG Xiqi,PENG Haipeng,LI Lixiang,LI Lixiang,YANG Yixian
  Computer Science and Technology 25 December 2019
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)