[1] |
Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG.
Research and implementation of reputation-based inter-domain routing selection mechanism
[J]. Journal on Communications, 2023, 44(6): 47-56.
|
[2] |
Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui.
Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network
[J]. Journal on Communications, 2023, 44(4): 124-136.
|
[3] |
Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI.
Multi-function supported privacy protection data aggregation scheme for V2G network
[J]. Journal on Communications, 2023, 44(4): 187-200.
|
[4] |
Haiyan KANG, Molan LONG.
Research on network attack analysis method based on attack graph of absorbing Markov chain
[J]. Journal on Communications, 2023, 44(2): 122-135.
|
[5] |
Yue ZHAO, Zan LI, Bing LI, Benjian HAO.
TDoA localization-refused area analysis and node placement strategy research
[J]. Journal on Communications, 2023, 44(1): 1-13.
|
[6] |
Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU.
Routing algorithm for railway monitoring linear WSN based on improved PSO
[J]. Journal on Communications, 2022, 43(5): 155-165.
|
[7] |
Xiujuan DU, Lijuan WANG, Jingping LIU, Long JIN.
Ranging localization method for nodes in underwater wireless sensor network based on zeroing neural dynamics
[J]. Journal on Communications, 2022, 43(10): 177-185.
|
[8] |
Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU.
Network security situational awareness model based on threat intelligence
[J]. Journal on Communications, 2021, 42(6): 182-194.
|
[9] |
Aijing SUN, Shichang LI, Yicai ZHANG.
WSN clustering routing algorithm based on PSO optimized fuzzy C-means
[J]. Journal on Communications, 2021, 42(3): 91-99.
|
[10] |
Tengfei ZHANG, Shunzheng YU.
Research prospects of user information detection from encrypted traffic of mobile devices
[J]. Journal on Communications, 2021, 42(2): 154-167.
|
[11] |
Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO.
Multi-level loss object tracking adversarial attack method based on spatial perception
[J]. Journal on Communications, 2021, 42(11): 242-254.
|
[12] |
Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU.
Survey of the future network technology and trend
[J]. Journal on Communications, 2021, 42(1): 130-150.
|
[13] |
Zhiyong LUO,Xu YANG,Jiahui LIU,Rui XU.
Network intrusion intention analysis model based on Bayesian attack graph
[J]. Journal on Communications, 2020, 41(9): 160-169.
|
[14] |
Yanjing SUN,Junqiu YANG,Yan CHEN,Yanfen WANG,Xiaojing CHEN,Fengzhen LIU,Zhi SUN.
RAW online regrouping method in IEEE 802.11ah protocol for industrial Internet of things
[J]. Journal on Communications, 2020, 41(4): 92-101.
|
[15] |
Hanxun ZHOU,Chen CHEN,Runze FENG,Junkun XIONG,Hong PAN,Wei GUO.
Mobile malware traffic detection approach based on value-derivative GRU
[J]. Journal on Communications, 2020, 41(1): 102-113.
|