-
161
Secure D2D underlaying cellular communication based on artificial noise assisted
Published 2015-10-01Get full text
Article -
162
Blind signature scheme based on trusted platform computation module
Published 2013-08-01Get full text
Article -
163
-
164
Using all-phase Fourier method to reconstruct discontinuous signal
Published 2005-01-01Get full text
Article -
165
-
166
Multi-cell downlink coordinated beam forming algorithm based on fairness duality theory
Published 2013-01-01Get full text
Article -
167
Analysis of Geological Factors of Xikeng Tunnel Wall Rock Stability
Published 2011-01-01Get full text
Article -
168
-
169
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01Get full text
Article -
170
RSU deployment planning based on approximation algorithm in urban VANET
Published 2018-01-01Get full text
Article -
171
Research on key functions locating technique based on software execution trace difference comparison
Published 2013-09-01Get full text
Article -
172
In-band network telemetry system based on high-performance packet processing architecture VPP
Published 2021-03-01Get full text
Article -
173
Feature separation and non-shadow information-guided shadow removal network
Published 2024-05-01Get full text
Article -
174
Cross-domain service chain mapping mechanism based on Q-learning
Published 2018-12-01Get full text
Article -
175
User grouping and power allocation algorithm for UAV-aided NOMA network
Published 2020-09-01Get full text
Article -
176
Shared carrier vertical network transformation algorithm in heterogeneous wireless networks
Published 2012-01-01Get full text
Article -
177
-
178
Design and research of service customized networking architecture
Published 2024-02-01Get full text
Article -
179
Graph-to-sequence deep reinforcement learning based complex task deployment strategy in MEC
Published 2024-03-01Get full text
Article -
180
Generalized 2D polynomial chaotic map and its application in information transmission
Published 2022-09-01Get full text
Article