[1] |
SUN Yanhua, QIAO Lan, WANG Zhuwei, LI Meng, SI Pengbo.
Hybrid Beamforming for Intelligent Reflecting Surface Assisted MIMO System
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 7-12.
|
[2] |
.
Content Caching Scheme Based on Federated Learning in Fog Computing Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(2): 22-28.
|
[3] |
SUN Yanhua, SHI Yahui, WANG Zhuwei, LI Meng, SI Pengbo.
A Personalized Federated Learning Algorithm Based on Meta-Learning and Knowledge Distillation
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 12-18.
|
[4] |
WANG Lei.
Consistency Checking Between UML Models and Code Based on Graph Theory and FSM
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 70-75.
|
[5] |
TANG Yong-li, HU Ming-xing, YE Qing, QIN Pan-ke, YU Jin-xia.
Improved Multi-Identity Based Fully Homomorphic Encryption Scheme over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 125-133.
|
[6] |
MA Min-yao, WU Lian, CHEN Song-liang, ZUO Yu, TANG Yan-ling.
Secure Transformation-Equivalence Determination Protocol Based on Additively Homomorphic Encryption System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 140-144.
|
[7] |
LI Ya, WANG Guang-run, WANG Qing.
A Deep Joint Learning Approach for Age Invariant Face Verification
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 84-88,110.
|
[8] |
ZHANG Peng, ZHANG Wen, NIU Shao-zhang, HUANG Zhen-peng.
Android Software Protection Method by Enhancing Security of Native Programs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(1): 21-25.
|
[9] |
LI Tie-feng, MA Cai-wen, LI Wen-hua.
The Orthogonal Verification Model Based on the on-Chip Coordinate Rotation Digital Computer
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(3): 35-38,43.
|
[10] |
.
An Authentication Watermarking Technique for Binary Images
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(5): 66-69.
|
[11] |
.
A Study of Secure Two-party Circle Computation Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 32-35.
|
[12] |
.
Chain Verification Signature Based on Elliptic Curve
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 42-45.
|
[13] |
XIAO Qian LUO Shou-Shan YANG Wen-Chuan ZHENG Kang-Feng.
Secure Multi-Party Fuzzy Comprehensive Evaluation Model and Its Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 5-9.
|
[14] |
LIU Wen1,3, LUO Shou-shan2,3, CHEN Ping4.
Privacy-Preserving Point-Line Relation Determination Protocol and Its Applications
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 72-75.
|
[15] |
DU Jian-zhong, ZHU Fu-chen.
Identity Verification in Quantum Key Distribution for Resisting Attack of Multi-Time Interceptions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2005, 28(1): 92-95.
|