[1] |
YANG Hua, GENG Xuan, KONG Ning.
A MAC Protocol for Wireless Networks Using Dueling-DDQN Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 25-30.
|
[2] |
Lü Boyu, ZHANG Jie.
Internal Attack Analysis of Quantum Key Agreement Protocol Based on Quantum Search Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 64-68,80.
|
[3] |
WANG Yi-fei, MO Shuang, WU Wen-rui, FAN Shao-hua, XIAO Ding.
Internal-External Convolutional Networks for Network Intrusion Detection
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 94-100.
|
[4] |
LI Shi-ning, FAN Xiang-hui, LIU Zhou-zhou, CHEN Chang-sheng, CHENG Tao.
Status and Analysis of Wireless Avionics Intra-Communications Network Protocol
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(3): 1-8.
|
[5] |
WANG Xiao-nan, FU Jin-xuan, YU Hong-fang, SUN Gang, CHEN Hai-bing.
Network Protocol Security Analysis Based on Abstract Principle and Model Detection
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 40-46.
|
[6] |
ZHANG Shun-wai, SHI Xiao-xiao.
Achievable Rate of the SWIPT-Based Half-Duplex Relay QF Cooperative System
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 14-19.
|
[7] |
WEN Wei.
Routing Algorithm Based on Density Clustering for Delay Tolerant Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 137-142.
|
[8] |
LI Zeng-peng, WANG Jiu-ru, ZHANG Wen-yin, MA Chun-guang.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 83-87.
|
[9] |
XIAO Jian, LI Wen-jiang, GENG Hong-yang, ZHAI Ying-bo.
An Anti-DoS Attack RFID Security Authentication Protocol in the Internet of Vehicles
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 114-119.
|
[10] |
WANG Ying, LI Hong-lin, FEI Zi-xuan, ZHAO Hong-yu, WANG Hong.
Research and Prospect of TCP Optimization in 5G Multi-Access Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2019, 42(1): 1-15.
|
[11] |
QI Qing-lei, WANG Wen-dong, GONG Xiang-yang, QUE Xi-rong.
A Time-Space Based Rules Placement Method
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 107-112.
|
[12] |
BAI Yuan, AN Jie, ZHANG Hui-bing.
Prediction-Aided Routing Protocol in Ad hoc Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 29-33.
|
[13] |
YAO Su, GUAN Jian-feng, PAN Hua, ZHANG Hong-ke.
Provably Secure Three-Elements Peer Access Authentication Protocol in Identifier/Locator Separation Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 58-62.
|
[14] |
ZHOU Yue-xian, WANG Bao-sheng, DENG Wen-ping, TANG Zhu, GAO Xian-ming.
Mobility Support of Locator/ID Separation Protocol Based on OpenLISP
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 117-121.
|
[15] |
LIU Ying, ZHU Si-yan, SUN Chen-hua, LI Guo-yan.
Performance Modeling and Analysis of Multi-Hop Ad Hoc Network under Delay Constraint
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(5): 24-29.
|