-
101
-
102
Dynamic traffic balancing scheme for LB-BvN to guarantee in-order packet delivering
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
103
-
104
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01“…Tongxin xuebao…”
Get full text
Article -
105
Interference graph based adaptive interference coordination method in indoor UDN
Published 2019-09-01“…Tongxin xuebao…”
Get full text
Article -
106
High-throughput and low-overhead probabilistic routing based on multi-player bargaining game for opportunistic networks
Published 2015-06-01“…Tongxin xuebao…”
Get full text
Article -
107
SYN flood attack defense strategy for asymmetric routing
Published 2013-08-01“…Tongxin xuebao…”
Get full text
Article -
108
Bit error rate analysis model of M-APSK based on total probability formula
Published 2024-07-01“…Tongxin xuebao…”
Get full text
Article -
109
-
110
-
111
Localization algorithm based on support vector regression for wirless sensor networks
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
112
Wi-Fi security evaluation model based on BP neural network
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article -
113
Building mechanism of trusted virtual domain via the VPE
Published 2013-12-01“…Tongxin xuebao…”
Get full text
Article -
114
Generate medical synthetic data based on generative adversarial network
Published 2022-03-01“…Tongxin xuebao…”
Get full text
Article -
115
Proactive migration model of SWIM service based on situation awareness
Published 2019-08-01“…Tongxin xuebao…”
Get full text
Article -
116
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01“…Tongxin xuebao…”
Get full text
Article -
117
-
118
Ustor: cloud storage system based on regenerating codes
Published 2014-04-01“…Tongxin xuebao…”
Get full text
Article -
119
-
120