-
241
-
242
Perceptual image hashing sensitive to content modification
Published 2012-11-01“…Tongxin xuebao…”
Get full text
Article -
243
Blockchain digital forensics: technology and architecture
Published 2024-12-01“…Tongxin xuebao…”
Get full text
Article -
244
-
245
Deterministic upper bounds on QoS performance about wireless ad hoc network based on network calculus
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
246
-
247
Survey of several key technologies for 5G
Published 2016-07-01“…Tongxin xuebao…”
Get full text
Article -
248
-
249
-
250
-
251
Algorithm for scenario benefit route planning based on user’s requests
Published 2018-05-01“…Tongxin xuebao…”
Get full text
Article -
252
-
253
-
254
Service function chain construct algorithm based on reliability
Published 2019-01-01“…Tongxin xuebao…”
Get full text
Article -
255
-
256
-
257
Space alternating generalized maximum-likelihood based low-complexity list detection algorithm
Published 2016-04-01“…Tongxin xuebao…”
Get full text
Article -
258
Multi-stage detection method for APT attack based on sample feature reinforcement
Published 2022-12-01“…Tongxin xuebao…”
Get full text
Article -
259
-
260