[1] |
Nan XIA, Danyang GAO, Baohui XING, Yaning WANG.
Direct localization algorithm of the aerial target based on external radiation source
[J]. Journal on Communications, 2023, 44(6): 117-124.
|
[2] |
Jun LI, Lejia ZHOU, Zhengquan LI, Ru JI, Jintao ZHU, Xingxin LIU, Ziyi LIU.
SCLF algorithm for polar code based on GRU network assistance and path metric exchange
[J]. Journal on Communications, 2023, 44(6): 223-237.
|
[3] |
Mu ZHOU, Jing ZHANG, Yong WANG, Xiaolong YANG, Lingxia LI.
Optical quantum positioning method based on random resampling of scattering free path
[J]. Journal on Communications, 2023, 44(3): 55-65.
|
[4] |
Dongbin WANG, Dongzhe WU, Hui ZHI, Kun GUO, Xu ZHANG, Jinqiao SHI, Yu ZHANG, Yueming LU.
Preventing flow table overflow against denial of service attack in software defined network
[J]. Journal on Communications, 2023, 44(2): 1-11.
|
[5] |
Binghao YAN, Qinrang LIU, Jianliang SHEN, Xiantuo TANG, Dong LIANG.
Fast loop-free path migration strategy in software defined network
[J]. Journal on Communications, 2022, 43(5): 24-35.
|
[6] |
Ru HUO, Xiangfeng CHENG, Chuang SUN, Shuo WANG, Tao HUANG, Yu F.Richard.
Topology optimization and forwarding strategy design for blockchain network
[J]. Journal on Communications, 2022, 43(12): 89-100.
|
[7] |
Zhengyu ZHU, Pengfei CHEN, Zixuan WANG, Kexian GONG, Di WU, Zhongyong WANG.
Short wave protocol signals recognition based on Swin-Transformer
[J]. Journal on Communications, 2022, 43(11): 127-135.
|
[8] |
Jinyin CHEN, Shulong HU, Changyou XING, Guomin ZHANG.
Deception defense method against intelligent penetration attack
[J]. Journal on Communications, 2022, 43(10): 106-120.
|
[9] |
Xiang GONG, Tao FENG, Jinze DU.
Formal modeling and security analysis method of security protocol based on CPN
[J]. Journal on Communications, 2021, 42(9): 240-253.
|
[10] |
Fangwei LI, Jiawen LU, Mingyue WANG.
Gain and phase errors calibration for joint time reversal and PCA dimensionality reduction over multipath environment
[J]. Journal on Communications, 2021, 42(8): 111-119.
|
[11] |
Qiuyang GU, Bao WU, Renyong CHI.
Link prediction method based on the similarity of high path
[J]. Journal on Communications, 2021, 42(7): 61-69.
|
[12] |
Ping WU, Chaowen CHANG, Yingying MA.
Port address overloading based packet forwarding verification in SDN
[J]. Journal on Communications, 2021, 42(7): 70-83.
|
[13] |
Shu FU, Xiangyue YANG, Haijun ZHANG, Chen CHEN, Peng YU, Xin JIAN, Min LIU.
UAV path intelligent planning in IoT data collection
[J]. Journal on Communications, 2021, 42(2): 124-133.
|
[14] |
Wenjuan WANG, Xuehui DU, Dibin SHAN.
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
[J]. Journal on Communications, 2021, 42(1): 1-17.
|
[15] |
Zhu WANG,Qingyun YUAN,Fanfan HAO,Liang FANG,Fenghua LI.
Multipath congestion control algorithm based on link capacity
[J]. Journal on Communications, 2020, 41(5): 59-71.
|