Open Access
ARTICLE
Yu Han1, Tiantian Ji1, Zhongru Wang1,2,*, Hao Liu3,*, Hai Jiang4, Wendi Wang1, Xiang Cui5
1 Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, 100876, China
2 Chinese Academy of Cyberspace Studies, Beijing, 100010, China
3 Qianxin Technology Group Co., Ltd., Beijing, 100088, China
4 Beijing DigApis Technology Co., Ltd., Beijing, 100081, China
5 Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, 510006, China
* Corresponding Authors: Zhongru Wang. Email: ; Hao Liu. Email:
(This article belongs to this Special Issue: Blockchain Security)
Computer Modeling in Engineering & Sciences 2021, 128(1), 247-267. https://doi.org/10.32604/cmes.2021.015809
Received 15 January 2021; Accepted 11 March 2021; Issue published 28 June 2021
View
Download
Like
Adversarial Learning for Distant Supervised Relation Extraction
Daojian Zeng, Yuan Dai, Feng Li,...Secure Model of Medical Data Sharing for Complex Scenarios
Wei She, Yue Hu, Zhao Tian, Guoning...