[1] |
Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG.
Scheduling framework based on reinforcement learning in online-offline colocated cloud environment
[J]. Journal on Communications, 2023, 44(6): 90-102.
|
[2] |
Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG.
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
[J]. Journal on Communications, 2023, 44(4): 216-225.
|
[3] |
Zexi XU, Lei ZHUANG, Kunli ZHANG, Mingyu GUI.
Online placement algorithm of service function chain based on knowledge graph
[J]. Journal on Communications, 2022, 43(8): 41-51.
|
[4] |
Hang QIU, Hongbo TANG, Wei YOU, Yu ZHAO, Yi BAI.
QGA-based network service extension algorithm in NFV
[J]. Journal on Communications, 2022, 43(11): 44-52.
|
[5] |
Huaqun WANG, Zhe LIU, Debiao HE, Jiguo LI.
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
[J]. Journal on Communications, 2021, 42(7): 52-60.
|
[6] |
Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG.
Secure and verifiable multi-keyword searchable encryption scheme in cloud
[J]. Journal on Communications, 2021, 42(4): 139-149.
|
[7] |
Ruiqi LI, Chunfu JIA, Yafei WANG.
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
[J]. Journal on Communications, 2021, 42(3): 11-22.
|
[8] |
Ze’nan WANG, Jiao ZHANG, Shuo WANG, Tao HUANG, F.Richard Yu.
Service chain deployment algorithms for deterministic end-to-end delay upper bound
[J]. Journal on Communications, 2021, 42(11): 66-78.
|
[9] |
Jianzhong SU, Huayu ZHANG, Hailong ZHU.
Computing method for periodic stream reservation in TSN combined with SDN controller
[J]. Journal on Communications, 2021, 42(10): 23-31.
|
[10] |
Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI.
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
[J]. Journal on Communications, 2021, 42(10): 81-94.
|
[11] |
Wenjuan WANG, Xuehui DU, Dibin SHAN.
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
[J]. Journal on Communications, 2021, 42(1): 1-17.
|
[12] |
Youliang TIAN,Qin LUO.
Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
[J]. Journal on Communications, 2020, 41(9): 118-129.
|
[13] |
Na WANG,Kun ZHENG,Junsong FU,Jian LI.
Method of ciphertext retrieval in mobile edge computing based on block segmentation
[J]. Journal on Communications, 2020, 41(7): 95-102.
|
[14] |
Yaomin WANG,Xia WANG,Yi DONG,Songhai ZHANG,Xinling SHI.
Data center traffic scheduling strategy based on Fibonacci tree optimization algorithm
[J]. Journal on Communications, 2020, 41(6): 112-127.
|
[15] |
Lindong ZHAO,Wenqin ZHUANG,Jianxin CHEN,Liang ZHOU.
Hierarchical task offloading in heterogeneous cellular network:modeling and optimization
[J]. Journal on Communications, 2020, 41(4): 34-44.
|