[1] |
HUO Yuanlian, GONG Qi, QI Yongfeng, AN Yaqi.
Adaptive Kernel RBFNN Based on Normalized Least Mean Square Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 29-35.
|
[2] |
SHI Rui, FENG Hua-min, YANG Yang, YUAN Feng, LIU Biao.
Mobile Crowdsensing Scheme with Strong Privacy-Preserving
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 114-120.
|
[3] |
LI Zeng-peng, WANG Jiu-ru, ZHANG Wen-yin, MA Chun-guang.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 83-87.
|
[4] |
LIU Yi-cheng, JIN Zhou, PU Ming.
A Finite-Time Back-Stepping Dynamic Surface Control
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 70-76.
|
[5] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[6] |
LOU Jian-ming, ZHU Ren-xiang, ZHENG You, ZHONG Qiu-bo.
MBER Optimization Algorithm for Communications with Wide Band Power Amplifiers
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(6): 37-41.
|
[7] |
LU You-jun, XU Dao-yun, ZHOU Jin-cheng.
Vertex Degree Distribution in Growth Models with Nonlinear Preferential Attachment Rule
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(5): 116-123.
|
[8] |
CHU Chun-yan, XIA Xu-jun, ZHANG Sheng-li.
Research on Continuous Variable Quantum Cryptography with Unbalanced Basis Choice
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 39-42.
|
[9] |
XIANG Xin-yin, LI Hui.
Lattice-Based Online/Offline Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(3): 117-120,134.
|
[10] |
LU Xiu-hua, WEN Qiao-yan, JIN Zheng-ping, WANG Li-cheng, YANG Chun-li.
Improvement of a Fuzzy Identity-Based Lattice Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 55-58.
|
[11] |
LAI Qi-qi, HU Yu-pu, CHEN Yuan, WANG Bao-cang, JIANG Ming-ming.
Construction of Auxiliary-Input Secure Lossy Trapdoor Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 6-10.
|
[12] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[13] |
MEN Ai-dong, JIANG Zhu-qing, WANG Yu-peng, HUANG Cheng-kai.
Application of Dual Adaptive UKF in Initial Alignment of SINS
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(1): 11-15.
|
[14] |
WANG Xin, SUN Chen, WANG Xin-mei.
Application of Homomorphic Hash Function in Multivariate Public Key Cryptosystem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 46-48.
|
[15] |
.
Blind Recognition of OFDM Signals in Multi-Path Fading Channels
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 74-78.
|