[1] |
LI Zineng, HU Zhiqun, XIAO Hailin, ZENG Zhangfan.
UAV security communication algorithm with Intelligent Reflecting Surface and cooperative Jamming
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 69-76.
|
[2] |
.
Physical Layer Security for IRS-based Cognitive NOMA V2V Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 131-137.
|
[3] |
SHI Zicheng, LI Xin, TANG Ying, HUANG Shanguo.
Optical Packet Filtering System Based on All-Optical Pattern Matching
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 96-101.
|
[4] |
YANG Hongyu, YUAN Haihang, ZHANG Liang.
A Risk Assessment Method of Network Host Node with Host Importance
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21.
|
[5] |
LI Meiling, YANG Xiaoxia, CHENG Wenjie, LU Zhaoming.
Physical Layer Security for CR-NOMA System in Vehicle-to-Everything
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 115-120.
|
[6] |
WANG Yong, GONG Jian, WANG Mingyue, JIANG Gongkun.
A Pseudo-Random Number Generator for Integer Chaotic Map
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 58-62.
|
[7] |
ZHANG Lei, CHEN Chuan, TAN Qi-yun, HAO Mao-xin, YANG Xue-kang.
An Image Encryption Algorithm Combining S-Box and Chaotic Mapping
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 40-47.
|
[8] |
TANG Yong-li, LI Xing-yu, ZHAO Zong-qu, LI Yun-feng.
Detection Method for Android Payment Cracked Application
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 95-101.
|
[9] |
LIU Lin-lan, XIAO Ting-zhong, XIA Yang, SHU Jian.
Link Quality Estimation Based on Extremely Fast Decision Tree
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(3): 125-130.
|
[10] |
XUE Jian-bin, BAI Zi-mei.
Security and Efficient Authentication Scheme for Mobile Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 110-116.
|
[11] |
WEN Wei.
Routing Algorithm Based on Density Clustering for Delay Tolerant Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 137-142.
|
[12] |
LI Zeng-peng, WANG Jiu-ru, ZHANG Wen-yin, MA Chun-guang.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 83-87.
|
[13] |
CHEN Pei-pei, LI Tao-shen, GE Zhi-hui, FANG Xing.
Secure Beamforming Design for Full-Duplex Energy-Constrained Relaying Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(2): 59-65,79.
|
[14] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[15] |
LEI Wei-jia, LI Huan.
Signal Combining and Self-Interference Cancellation Scheme Based on Linear Neural Network in a Full-Duplex Receiver Cooperative Jamming System
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 61-67.
|