[1] |
.
Few-shot face spoofing detection using feedforward learning network
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 0-0.
|
[2] |
.
Reverse-analysis of S-box for SM4-like Algorithms Based on Side Channel Technology
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 0-0.
|
[3] |
TANG Yong-li, ZHAO Ming-jie, LI Li-xiang.
Research on Compressed Sensing Security Theory
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(3): 125-130.
|
[4] |
SONG Cheng, ZHANG Ya-dong, PENG Wei-ping, WANG Lei, LIU Zhi-zhong.
Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(1): 135-142.
|
[5] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(1): 104-110.
|
[6] |
ZHANG Guo-dong, YING Huan, YANG Shou-guo, SHI Zhi-qiang, LI Ji-yuan.
Automatic Identification and Cracking Method for Vulnerable Hash Functions of Embedded Firmwares
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(1): 46-53.
|
[7] |
WANG Si-qi, MIAO Si-wei, ZHANG Xiao-ling, SHI Zhi-qiang, LU Xin-dai.
Static Vulnerability Detection Technology for the Embedded Firmware Web Code Based on D-S Evidence Theory
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 91-99.
|
[8] |
SONG Cheng, GU Xin-an, WANG Lei, LIU Zhi-zhong, YAN Xi-xi.
Research on Identity-Based Batch Anonymous Authentication Scheme for Vehicular Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 69-74.
|
[9] |
JING Min, REN Na, ZHU Chang-qing, ZHOU Zi-chen.
The Zero Watermarking Algorithm Based on Distance Partition for BIM Modeling
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 100-106.
|
[10] |
WANG Yong, WANG Guo-dong, ZHANG Zhi-qiang, ZHOU Qing.
A New Graph Encryption Algorithm Based on Revised Ising Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 64-69.
|
[11] |
REN Shuai, WANG Zhen, XU Zhen-chao, SU Dong-xu, HE Yuan.
Information Hiding Scheme Based on Texture Mapping of 3D Model in OBJ Format
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(1): 22-27.
|
[12] |
SONG Cheng, ZHANG Ya-dong, WANG Lei, LIU Zhi-zhong, CHAO Hao.
Trajectory Privacy Protection Scheme Based on DTW Exchange Query
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 97-102.
|
[13] |
XUE Yi-ming, ZHOU Xue-jing, ZHOU Xiao-shi, NIU Shao-zhang, WEN Juan.
Text Steganography Based on Image Caption
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 7-13.
|
[14] |
CHEN Hong-song, SHEN Qiang-lei.
Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 113-118.
|
[15] |
TANG Yong-li, HU Ming-xing, YE Qing, QIN Pan-ke, YU Jin-xia.
Improved Multi-Identity Based Fully Homomorphic Encryption Scheme over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 125-133.
|