-
1
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
2
Based on linear systolic array for convolutional neural network’s calculation optimization and performance analysis
Published 2018-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
3
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Published 2017-05-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
4
Service function chain deployment scheme based on heterogeneous backup and remapping
Published 2018-06-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
5
AntiGPS spoofing method for UAV based on LSTM-KF model
Published 2020-10-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
6
Design and implementation of the controller scheduling-time in SDN
Published 2018-01-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
7
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
8
Threshold model for hot events spreading based on relative impact weight of the user
Published 2017-09-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
9
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
10
Research progress on dynamic hopping technology for network layer
Published 2021-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
11
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
12
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
13
Behavior-oriented inside network security situation modeling and analysis
Published 2016-08-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
14
Host security threat analysis approach for network dynamic defense
Published 2018-04-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
15
Evaluation of blended instruction based on network platform in cryptography teaching
Published 2019-06-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
16
Robust non-negative supervised low-rank discriminant embedding algorithm
Published 2021-09-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
17
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
18
Robust Schnorr-based subgroup multi-signature scheme
Published 2024-08-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
19
Image recoloring detection based on inter-channel correlation
Published 2022-10-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article -
20
ACP based parallel power generation control system
Published 2019-09-01“…POSTS&TELECOM PRESS Co., LTD…”
Get full text
Article