[1] |
Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG.
A lightweight privacy-preserving truth discovery mechanism for IoT
[J]. Telecommunications Science, 2021, 37(5): 124-132.
|
[2] |
Shuangxing WANG, Jintang LUO, Lisha SHUAI, Jiamin ZHANG, Min ZHANG, Xiaolong YANG.
Cloud data anonymous assured deletion approach based on blockchain
[J]. Telecommunications Science, 2021, 37(3): 90-104.
|
[3] |
Chi ZHANG, Ye LU, Yuping LUO, Xiaokai SUN, Hanke ZHU.
A novel approach for face privacy protection based on surveillance video in complex scene
[J]. Telecommunications Science, 2021, 37(1): 94-101.
|
[4] |
Shaoliang PENG,Liang BAI,Li WANG,Minxia CHENG,Shulin WANG.
Trusted edge computing for smart healthcare
[J]. Telecommunications Science, 2020, 36(6): 56-63.
|
[5] |
Chunlei PENG,Xinbo GAO,Nannan WANG,Jie LI.
Dependable identity recognition and authorization based on visual information
[J]. Telecommunications Science, 2020, 36(11): 1-17.
|
[6] |
Zishan LIU,Qiang CHENG,Bo LV.
A survey on key technologies of privacy protection for machine learning
[J]. Telecommunications Science, 2020, 36(11): 18-27.
|
[7] |
Weiyu JIANG, Bingyang LIU, Chuang WANG.
Network architecture with intrinsic security
[J]. Telecommunications Science, 2019, 35(9): 20-28.
|
[8] |
Ming XU,Xue YANG,Jianwu ZHANG.
A review of network traffic analysis targeting mobile devices
[J]. Telecommunications Science, 2018, 34(4): 98-108.
|
[9] |
Chaoyi BIAN,Shaomin ZHU,Tao ZHOU.
Implementation of a big data anonymization system based on Spark
[J]. Telecommunications Science, 2018, 34(4): 156-161.
|
[10] |
Ye CHEN,Dongjin XU,Liang XIAO.
Survey on network security based on blockchain
[J]. Telecommunications Science, 2018, 34(3): 10-16.
|
[11] |
Shengli ZHOU,Bin CHEN,Lifa WU.
Data security protection schema of telecom operators under the environment of big data
[J]. Telecommunications Science, 2017, 33(5): 119-125.
|
[12] |
Jianxin Liao.
Big Data Technology:Current Applications and Prospects
[J]. Telecommunications Science, 2015, 31(7): 1-12.
|
[13] |
Feng Gao,Feng Zhang,Wei Zhou.
Study on Standardization of Privacy Protection in Network Environment
[J]. Telecommunications Science, 2013, 29(4): 112-117.
|
[14] |
Lusheng Shi,Huibo Zhu,Lin Chen.
Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network
[J]. Telecommunications Science, 2013, 29(11): 23-28.
|
[15] |
Ping Qian,Meng Wu.
A Privacy Preserving Method in WSN
[J]. Telecommunications Science, 2013, 29(1): 23-51.
|