-
5081
Survey on trust evaluation mechanism in sensor-cloud
Published 2018-06-01“…Tongxin xuebao…”
Get full text
Article -
5082
-
5083
-
5084
-
5085
-
5086
-
5087
-
5088
Artificial noise-aided robust secure information and power transmission scheme in heterogeneous networks with simultaneous wireless information and power transfer
Published 2019-03-01“…Tongxin xuebao…”
Get full text
Article -
5089
-
5090
Design for database access control mechanism based on blockchain
Published 2020-05-01“…Tongxin xuebao…”
Get full text
Article -
5091
-
5092
Second fitness selection QPSO and SA cooperative search for large-scale discrete optimization algorithm
Published 2020-08-01“…Tongxin xuebao…”
Get full text
Article -
5093
Address overloading-based packet forwarding verification in SDN
Published 2022-03-01“…Tongxin xuebao…”
Get full text
Article -
5094
Optimal path identification to defend against DDoS attacks
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
5095
-
5096
Smart contract vulnerability detection method based on pre-training and novel timing graph neural network
Published 2024-09-01“…Tongxin xuebao…”
Get full text
Article -
5097
-
5098
Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV
Published 2014-10-01“…Tongxin xuebao…”
Get full text
Article -
5099
Research on deep reinforcement learning in Internet of vehicles edge computing based on Quasi-Newton method
Published 2024-05-01“…Tongxin xuebao…”
Get full text
Article -
5100
A Speech Recognition Method Using Competitive and Selective Learning Neural Networks
Published 1998-01-01“…Tongxin xuebao…”
Get full text
Article