[1] |
Zhilong ZHANG, Tianqi ZHANG, Xuefei LI, Danpu LIU.
Research on collaborative resource optimization technology based on convergence of computing, control and communication in Internet of vehicles
[J]. Telecommunications Science, 2023, 39(4): 17-30.
|
[2] |
Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU.
A survey of V2X security protection technologies
[J]. Telecommunications Science, 2023, 39(3): 1-15.
|
[3] |
Bo GU, Ting AO.
Application of MEC-based positioning technology in the Internet of vehicles
[J]. Telecommunications Science, 2022, 38(Z1): 250-258.
|
[4] |
Jiao WANG, Gongan QIU, Shibing ZHANG.
Adaptive channel status based access class barring scheme for traffic emergency communication
[J]. Telecommunications Science, 2022, 38(1): 95-101.
|
[5] |
Zhongping WU, Lujie WANG, Jianuo XU, Yanbo WANG, Liwei ZHANG.
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
[J]. Telecommunications Science, 2022, 38(1): 159-169.
|
[6] |
Ning HUI,Jie WU,Yiqing ZHOU,Ling LIU,Zhengang PAN.
Future vehicular fog computing networks
[J]. Telecommunications Science, 2020, 36(6): 14-27.
|
[7] |
Lin LIN,Lu LI,Yuming GE.
Analysis of the communication standardization and industry development of internet of vehicles
[J]. Telecommunications Science, 2020, 36(4): 15-26.
|
[8] |
Wei LIU,Yipeng ZHANG,Xuying GUAN,Shangchao KUANG,Feng LI.
C-V2X city-scale demonstration application
[J]. Telecommunications Science, 2020, 36(4): 27-35.
|
[9] |
Yufeng LI,Xiaoyuan LU,Chenhong CAO,Jiangtao LI,Hongyi ZHU,Nan MENG.
A survey of cybersecurity for intelligent connected-automated vehicle
[J]. Telecommunications Science, 2020, 36(4): 36-45.
|
[10] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|
[11] |
Bo JIN,Yanming HU.
Overview and prospect for the development of C-V2X internet of vehicles industry
[J]. Telecommunications Science, 2020, 36(3): 93-99.
|
[12] |
Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN.
Design of multi-key encryption method
[J]. Telecommunications Science, 2020, 36(11): 89-97.
|
[13] |
Yuan ZHANG,Huifen WANG,Hanming WANG.
Machine vision technology,standardization,and application in safety industry
[J]. Telecommunications Science, 2020, 36(11): 104-112.
|
[14] |
Xiaoyin XI,Xiaoyun YUAN.
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
[J]. Telecommunications Science, 2020, 36(11): 134-140.
|
[15] |
FANG Jian,FENG Daquan,DUAN Haijun,ZHENG Canjian,QIAN Gongbin.
An overview of V2X communications
[J]. Telecommunications Science, 2019, 35(6): 102-112.
|