[1] |
LI Zineng, HU Zhiqun, XIAO Hailin, ZENG Zhangfan.
UAV security communication algorithm with Intelligent Reflecting Surface and cooperative Jamming
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 69-76.
|
[2] |
.
Physical Layer Security for IRS-based Cognitive NOMA V2V Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 131-137.
|
[3] |
.
Multicast Service Chain Deployment and Adjustment Method under User Dynamic Access
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 55-61.
|
[4] |
SHI Zicheng, LI Xin, TANG Ying, HUANG Shanguo.
Optical Packet Filtering System Based on All-Optical Pattern Matching
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 96-101.
|
[5] |
YANG Hongyu, YUAN Haihang, ZHANG Liang.
A Risk Assessment Method of Network Host Node with Host Importance
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21.
|
[6] |
LI Meiling, YANG Xiaoxia, CHENG Wenjie, LU Zhaoming.
Physical Layer Security for CR-NOMA System in Vehicle-to-Everything
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 115-120.
|
[7] |
WANG Yong, GONG Jian, WANG Mingyue, JIANG Gongkun.
A Pseudo-Random Number Generator for Integer Chaotic Map
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 58-62.
|
[8] |
ZHANG Lei, CHEN Chuan, TAN Qi-yun, HAO Mao-xin, YANG Xue-kang.
An Image Encryption Algorithm Combining S-Box and Chaotic Mapping
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 40-47.
|
[9] |
TANG Yong-li, LI Xing-yu, ZHAO Zong-qu, LI Yun-feng.
Detection Method for Android Payment Cracked Application
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 95-101.
|
[10] |
HAO Wan-ming, YAO Zhuang, SUN Gang-can, ZHU Zheng-yu, ZHOU Yi-qing.
A Joint Beamforming Design for Optimizing Service State of Base Station in C-RAN
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(3): 41-46.
|
[11] |
GAO Yue-hong, YANG Hao-tian, CHEN Lu, YANG Hong-wen, YIN Ning.
Selection Algorithm of eMBB/URLLC Multiplexing Schemes Based on Fuzzy Logic
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(3): 15-20,34.
|
[12] |
XUE Jian-bin, BAI Zi-mei.
Security and Efficient Authentication Scheme for Mobile Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 110-116.
|
[13] |
LI Zeng-peng, WANG Jiu-ru, ZHANG Wen-yin, MA Chun-guang.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 83-87.
|
[14] |
CHEN Pei-pei, LI Tao-shen, GE Zhi-hui, FANG Xing.
Secure Beamforming Design for Full-Duplex Energy-Constrained Relaying Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(2): 59-65,79.
|
[15] |
YANG Yang, SHI Xiao-dan, SONG Shuang, HUO Yong-hua, CHEN Lian-dong.
Alarm Correlation Analysis Based on Rete Rule Reasoning
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(2): 23-28.
|