[1] |
Xiang LI,Yuan LI,Zifei ZHANG,Zhe YANG.
A density clustering-based network performance failure big data analysis algorithm
[J]. Telecommunications Science, 2020, 36(9): 51-58.
|
[2] |
Ziyu XIAO.
A review of key technologies for the future of the 2030 network——Beyond 5G
[J]. Telecommunications Science, 2020, 36(9): 114-121.
|
[3] |
Ye OUYANG,Aidong YANG,Fanyu MENG.
A game theory-assisted machine learning methodology for subscriber churn behaviors detection
[J]. Telecommunications Science, 2020, 36(6): 79-89.
|
[4] |
Feng LIN,Liujing XU,Xiaohua CHEN,Weiqiang QI,Ke CHEN,Tiantian ZHU.
Method of Webshell detection based on multi-view feature fusion
[J]. Telecommunications Science, 2020, 36(6): 125-132.
|
[5] |
Tao PANG,Haihua QIU,Biying PAN.
Research on artificial intelligence key technologies of mobile terminal
[J]. Telecommunications Science, 2020, 36(5): 145-151.
|
[6] |
Jiantao SHENG,Maofei CHEN,Dongxin LIU,Laifu WANG,Guoshui SHI,Huamin JIN.
Detection of malicious domain name based on a classifier combination
[J]. Telecommunications Science, 2020, 36(5): 47-55.
|
[7] |
Qizhu ZHONG.
Research and application of VoLTE video call quality based on machine learning
[J]. Telecommunications Science, 2020, 36(3): 156-165.
|
[8] |
Zishan LIU,Qiang CHENG,Bo LV.
A survey on key technologies of privacy protection for machine learning
[J]. Telecommunications Science, 2020, 36(11): 18-27.
|
[9] |
Xiaolian CHEN,Yi QIN,Jie ZHANG,Yajie LI,Haokun SONG,Huibin ZHANG.
Optical fiber eavesdropping detection method based on machine learning
[J]. Telecommunications Science, 2020, 36(11): 61-67.
|
[10] |
Jia LI,Li CONG,Hua JIANG,Yang HU,Meng XU.
Bandwidth prediction of power communication network based on DBN-Softmax
[J]. Telecommunications Science, 2020, 36(10): 153-158.
|
[11] |
Fei GUI,Yang CHENG,Dan LI,Sihong HONG.
Internet intelligent routing architecture and algorithm
[J]. Telecommunications Science, 2020, 36(10): 12-20.
|
[12] |
WU Zhefu,TANG Wanli,CHEN Cheng,FANG Luping.
Real-time detection method of smoke based on Wi-Fi
[J]. Telecommunications Science, 2019, 35(6): 70-77.
|
[13] |
Yaguan QIAN,Xiaohui GUAN,Shuhui WU,NBensheng YU,Dongxiao REN.
A novel perturbation attack on SVM by greedy algorithm
[J]. Telecommunications Science, 2019, 35(1): 81-89.
|
[14] |
Jiantong ZHOU,Haitao YANG,Dong LIU,Xiang MA,Tian WANG.
Trends and technologies of video coding
[J]. Telecommunications Science, 2017, 33(8): 16-25.
|
[15] |
Jinming ZHAO.
A network status evaluation method based on random projection
[J]. Telecommunications Science, 2016, 32(8): 164-168.
|