[1] |
Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG.
Scheduling framework based on reinforcement learning in online-offline colocated cloud environment
[J]. Journal on Communications, 2023, 44(6): 90-102.
|
[2] |
Wei ZHANG, Yu WANG, Xinyi CHEN, Yanwen WANG, Qingyang JING, Weimin LEI.
Background reference frame generation method for surveillance video based on image block codebook model
[J]. Journal on Communications, 2023, 44(1): 129-141.
|
[3] |
Yanwen WANG, Weimin LEI, Wei ZHANG, Huan MENG, Xinyi CHEN, Wenhui YE, Qingyang JING.
Survey on video image reconstruction method based on generative model
[J]. Journal on Communications, 2022, 43(9): 194-208.
|
[4] |
Shengqian HAN, Han LOU, Junlai WANG.
Traffic evaluation and modeling for spatio-temporal slicing based VR panoramic video transmission
[J]. Journal on Communications, 2022, 43(7): 102-112.
|
[5] |
Yanchao GONG, Ling WANG, Ying LIU, Kaifang YANG, Qingfan LIN, Fuping WANG.
HEVC perceptual intra-frame rate control inspired by video subjective observation experiment
[J]. Journal on Communications, 2021, 42(8): 90-102.
|
[6] |
Jiujiu CHEN, Chunyan FENG, Caili GUO, Yang YANG, Qizheng SUN, Meiyi ZHU.
Video semantics-driven resource allocation algorithm in Internet of vehicles
[J]. Journal on Communications, 2021, 42(7): 1-11.
|
[7] |
Huaqun WANG, Zhe LIU, Debiao HE, Jiguo LI.
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
[J]. Journal on Communications, 2021, 42(7): 52-60.
|
[8] |
Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG.
Secure and verifiable multi-keyword searchable encryption scheme in cloud
[J]. Journal on Communications, 2021, 42(4): 139-149.
|
[9] |
Ruiqi LI, Chunfu JIA, Yafei WANG.
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
[J]. Journal on Communications, 2021, 42(3): 11-22.
|
[10] |
Lizhi XIONG, Mengqi CAO, Zhangjie FU.
Forensic of video object removal tamper based on 3D dual-stream network
[J]. Journal on Communications, 2021, 42(12): 202-211.
|
[11] |
Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO.
Multi-level loss object tracking adversarial attack method based on spatial perception
[J]. Journal on Communications, 2021, 42(11): 242-254.
|
[12] |
Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI.
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
[J]. Journal on Communications, 2021, 42(10): 81-94.
|
[13] |
Wenjuan WANG, Xuehui DU, Dibin SHAN.
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
[J]. Journal on Communications, 2021, 42(1): 1-17.
|
[14] |
Youliang TIAN,Qin LUO.
Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
[J]. Journal on Communications, 2020, 41(9): 118-129.
|
[15] |
Na WANG,Kun ZHENG,Junsong FU,Jian LI.
Method of ciphertext retrieval in mobile edge computing based on block segmentation
[J]. Journal on Communications, 2020, 41(7): 95-102.
|