[1] |
Yifan DING, Guangqiu LI, Hui LI.
Physical layer security of NOMA-D2D cooperative wireless system
[J]. Telecommunications Science, 2022, 38(9): 83-94.
|
[2] |
Yifan DING, Guangqiu LI, Hui LI.
Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers
[J]. Telecommunications Science, 2022, 38(3): 133-142.
|
[3] |
Mingliang GAO, Bo ZHUANG, Xuefei NIU, Mouying LI.
Automatic control technology of low frequency and low voltage splitting devices using wide area measurement information
[J]. Telecommunications Science, 2022, 38(12): 86-93.
|
[4] |
Weina ZHOU, Lu LIU.
A real-time detection method for multi-scale ships in complex scenes
[J]. Telecommunications Science, 2022, 38(10): 67-78.
|
[5] |
Ying CHENG, Guangqiu LI, Jingjie SHEN, Liang WEI.
Physical layer security performance of MF relay selection systems
[J]. Telecommunications Science, 2021, 37(9): 95-104.
|
[6] |
Sai XU, Shuai HAN, Weixiao MENG.
A secure transmission method based on cooperative jamming for correlated main and wiretap channels
[J]. Telecommunications Science, 2021, 37(6): 105-114.
|
[7] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[8] |
Li SU, Li LU, Xing ZHANG, Chang LIU.
Graph database based security protection mechanism of 5G network data flow
[J]. Telecommunications Science, 2021, 37(4): 28-36.
|
[9] |
Zhenlei DAN,Xuewen WU,Jian OUYANG,Xiaoxiao WANG,Chenwei GU.
Outage performance analysis for multi-UAV relay systems with threshold-based DF protocol
[J]. Telecommunications Science, 2020, 36(8): 103-111.
|
[10] |
Xiaojun LIU,Juan WU,Xiaoqing XU.
Big data architecture analysis and data security fusion technology
[J]. Telecommunications Science, 2020, 36(7): 146-155.
|
[11] |
Hui QIAN,Guangqiu LI,Yifan DING.
Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers
[J]. Telecommunications Science, 2020, 36(5): 65-72.
|
[12] |
Bowei WANG,Jin TAN.
Compressed sensing subspace pursuit algorithm based on two stagewise weak selection
[J]. Telecommunications Science, 2020, 36(5): 83-92.
|
[13] |
Feng ZHU,Qun HUANG.
Multi-stage hashing network storage structure for intelligent routing
[J]. Telecommunications Science, 2020, 36(10): 67-78.
|
[14] |
Qichao SUN,Jianrong BAO,Chao LIU,Bin JIANG,Fang ZHU,Jianhai HE.
Improved Polar selective decoding and forwarding cooperation
[J]. Telecommunications Science, 2020, 36(1): 77-87.
|
[15] |
Hongbin ZHU,Long AN,Mingchen YANG.
Research and practice on power big data security governance system
[J]. Telecommunications Science, 2019, 35(11): 140-145.
|