[1] |
Hui MA, Ruiqin WANG, Shuai YANG.
A progressive growing of conditional generative adversarial networks model
[J]. Telecommunications Science, 2023, 39(6): 105-113.
|
[2] |
Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yangdong XU.
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
[J]. Telecommunications Science, 2023, 39(6): 122-128.
|
[3] |
Le ZHANG, Hongyuan MA.
Practice on edge cloud security of telecom operators
[J]. Telecommunications Science, 2023, 39(4): 165-172.
|
[4] |
Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU.
A survey of V2X security protection technologies
[J]. Telecommunications Science, 2023, 39(3): 1-15.
|
[5] |
Xinyu MIAO, Changjun HU, Hua CHENG.
Research on key synchronization problems of mobile communication: technology, standards and testing
[J]. Telecommunications Science, 2023, 39(3): 80-88.
|
[6] |
Jingjie SHEN, Guangqiu LI, Yancui LUO, Huizhi LIU.
Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI
[J]. Telecommunications Science, 2023, 39(3): 89-99.
|
[7] |
Yu KANG, Yaqiong LIU, Tongyu ZHAO, Guochu SHOU.
A survey on AI algorithms applied in communication and computation in Internet of vehicles
[J]. Telecommunications Science, 2023, 39(1): 1-19.
|
[8] |
Pengfei SUN, Li LIN, Zhe SI.
Methodology and standardised competence construction of 5GtoB scaled replication
[J]. Telecommunications Science, 2022, 38(Z1): 3-10.
|
[9] |
Yifan DING, Guangqiu LI, Hui LI.
Physical layer security of NOMA-D2D cooperative wireless system
[J]. Telecommunications Science, 2022, 38(9): 83-94.
|
[10] |
Jianwu ZHANG, Yanjun AN, Huangyan DENG.
A survey on DNS attack detection and security protection
[J]. Telecommunications Science, 2022, 38(9): 1-17.
|
[11] |
Yusun FU, Jinhui TANG.
A survey on 5G capabilities enabling the factories of the future
[J]. Telecommunications Science, 2022, 38(9): 18-35.
|
[12] |
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG.
Research and practice of network security threat intelligence management system for power enterprise
[J]. Telecommunications Science, 2022, 38(7): 184-189.
|
[13] |
Hongbin LUO, Shan ZHANG, Zhiyuan WANG.
Interconnection and coexistence of heterogeneous network:requirements, challenges, and architecture
[J]. Telecommunications Science, 2022, 38(6): 18-30.
|
[14] |
Yifan DING, Guangqiu LI, Hui LI.
Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers
[J]. Telecommunications Science, 2022, 38(3): 133-142.
|
[15] |
Xia GONG, Huanan CHEN, Yongqing ZHU, Youming WU, Ke RUAN.
Research on SRv6 header compression schemes
[J]. Telecommunications Science, 2022, 38(12): 133-140.
|