[1] |
ZHANG Jiamin, SHUAI Lisha, DONG Gaoya, YANG Xiaolong.
A Truth-Oriented Trust Evaluation Model of Shared Messages about Road Events in Internet of Vehicles
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 40-45.
|
[2] |
DU Maokang, PENG Junjie, HU Yongjin, Xiao Ling.
Logistic Regression Matrix Factorization Recommendation Algorithm for Differential Privacy
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 115-120.
|
[3] |
REN Shuai, LEI Xuemei, DAN Zhuoyi, HE Xiao, SHI Lei.
Multi-Carrier Information Hiding Algorithm Based on Vertex Partition of 3D Model
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 109-114,126.
|
[4] |
SHI Rui, FENG Hua-min, YANG Yang, YUAN Feng, LIU Biao.
Mobile Crowdsensing Scheme with Strong Privacy-Preserving
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 114-120.
|
[5] |
WANG Yong, YIN En-min, RAN Xun.
Differential Privacy-Preserving Recommendation Algorithm Based on Bhattacharyya Coefficient Clustering
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 81-88.
|
[6] |
REN Shuai, WANG Zhen, XU Zhen-chao, SU Dong-xu, HE Yuan.
Information Hiding Scheme Based on Texture Mapping of 3D Model in OBJ Format
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(1): 22-27.
|
[7] |
XUE Yi-ming, ZHOU Xue-jing, ZHOU Xiao-shi, NIU Shao-zhang, WEN Juan.
Text Steganography Based on Image Caption
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 7-13.
|
[8] |
SHEN Hua, CHEN Mi-wen, ZHANG Ming-wu.
Leakage-Resilient Verifiable Multi-Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 87-91.
|
[9] |
YANG Song-tao, MA Chun-guang, ZHOU Chang-li.
NCoP: A Non-Cooperative Location Privacy-Preserving Method
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 86-90.
|
[10] |
.
An Authentication Watermarking Technique for Binary Images
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(5): 66-69.
|
[11] |
LIU Nian ZHOU Ya-jian NIU Xin-xin YANG Yi-xian.
Study on Querying Encrypted XML Databases
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(2): 105-110.
|
[12] |
LI Zhao-hong, HOU Jian-jun, SONG Wei .
Image Authentication Method Based on Divergent Block-dependent Watermarking
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(5): 107-111.
|
[13] |
WANG Yu-long, YANG Fang-chun, SUN Qi-bo .
Model-Based Quantitative Method of Network Vulnerability Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(4): 58-61.
|
[14] |
ZHOU Hua1, MENG Xiang-ru1, Yang Mao-fan2, ZHANG Li1.
Quantifying the State Transition Model of Intrusion Tolerance System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 94-97.
|
[15] |
GUO Shi-ze1, NIU Guan-jie2, ZHENG Kang-feng2.
An Intrusion Tolerance Model and Quantizing Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 36-39.
|