-
3561
-
3562
-
3563
-
3564
-
3565
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01“…Tongxin xuebao…”
Get full text
Article -
3566
-
3567
Time-triggered stream scheduling method combining no-wait and time-slot mapping reuse
Published 2024-08-01“…Tongxin xuebao…”
Get full text
Article -
3568
-
3569
-
3570
Co-pairwise ranking model for item recommendation
Published 2019-09-01“…Tongxin xuebao…”
Get full text
Article -
3571
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01“…Tongxin xuebao…”
Get full text
Article -
3572
MAC protocols in ultra-wide band system
Published 2005-01-01“…Tongxin xuebao…”
Get full text
Article -
3573
-
3574
-
3575
-
3576
-
3577
Analysis on traveling time of Internet
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
3578
-
3579
Fundamental performance bounds for multi-performance criteria in wireless ad hoc networks
Published 2015-06-01“…Tongxin xuebao…”
Get full text
Article -
3580