[1] |
Xin LI, Jun SUN.
Value-difference learning based mMTC devices access algorithm in multi-cell network
[J]. Telecommunications Science, 2022, 38(6): 82-90.
|
[2] |
Yunyi LIU, Jianmin ZHANG, Xiaoli FENG, Liwei ZHANG.
5G MEC system security capability deployment scheme
[J]. Telecommunications Science, 2022, 38(11): 143-152.
|
[3] |
Junning QIN,Jiajia HAN,Sheng ZHOU,Chunming WU,Shuangxi CHEN,Ruoyan ZHAO,Jiangyu ZHANG.
Modeling of the mimic defense based on heterogeneous redundancy
[J]. Telecommunications Science, 2020, 36(5): 31-38.
|
[4] |
Furong XU,Weiwen WENG,Chao ZHANG,Tingting BIAN,Xinli MA,Xiangdong GAO,Xin LI,Lei CAO.
Research status and development trend of NB-IoT enhancement technology
[J]. Telecommunications Science, 2020, 36(2): 130-136.
|
[5] |
Nishui CAI,Yirong SHI,Chenxu QIU.
Open platform and key technology of mobile application security depth detection capability
[J]. Telecommunications Science, 2018, 34(3): 41-49.
|
[6] |
Chuangchuang LI,Guangyue LU,Hanglong WANG.
SVM classifier for telecom user arrears based on boundary samples-based under-sampling approaches
[J]. Telecommunications Science, 2017, 33(9): 85-91.
|
[7] |
Jiyan WANG,Xiaozhou WANG,Qian WU,Lili ZHU,Xiansu GAO,Yun LU,Mingming ZOU.
Core network service model and networking scheme oriented NB-IoT
[J]. Telecommunications Science, 2017, 33(4): 148-154.
|
[8] |
CAI Kang, ZHOU Tao, ZHANG Jianwu .
[J]. Telecommunications Science, 2017, 33(2): 0-.
|
[9] |
Xiang Yu,Lei Liu,Kun Wu.
Optimal Routing Between Clusters Based on Circular Search Method in WSN
[J]. Telecommunications Science, 2015, 31(2): 103-107.
|
[10] |
Xiaoguang Zhu,Hua Jiang.
Researcb on PCI Self-Configuration Tecbnology of LTE eNB System
[J]. Telecommunications Science, 2014, 30(7): 130-134.
|
[11] |
Xiang Zhao,Jiming Lin.
Joint Research on Clock Synchronization and Localization in Wireless Sensor Network with Stochastic Exponentially Distributed Noise
[J]. Telecommunications Science, 2014, 30(10): 99-102.
|
[12] |
Xiaoming Wang,Yanyan Du,Xin Jiang.
Analysis of Home NodeB’s Authentication
[J]. Telecommunications Science, 2009, 25(4): 16-19.
|
[13] |
Wang Xiaoming,Du Yanyan and Jiang Xin.
Analysis of Home NodeB’s Authentication
[J]. Telecommunications Science, 2009, 25(3): 16-19.
|