-
7661
Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy
Published 2015-10-01“…Tongxin xuebao…”
Get full text
Article -
7662
CAC scheme with imperfect power control in broadband CDMA networks
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
7663
-
7664
-
7665
Malicious domain name detection method based on associated information extraction
Published 2021-10-01“…Tongxin xuebao…”
Get full text
Article -
7666
-
7667
Pilot allocation based on user location information in massive MIMO systems
Published 2017-08-01“…Tongxin xuebao…”
Get full text
Article -
7668
Blockchain address risk behavior identification algorithm based on neural differential equations
Published 2024-10-01“…Tongxin xuebao…”
Get full text
Article -
7669
-
7670
Survey of the intelligent and connected vehicle cybersecurity
Published 2020-06-01“…Tongxin xuebao…”
Get full text
Article -
7671
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01“…Tongxin xuebao…”
Get full text
Article -
7672
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
7673
-
7674
-
7675
-
7676
Data provision for IoT searches:an auction approach
Published 2015-12-01“…Tongxin xuebao…”
Get full text
Article -
7677
-
7678
Online trace anonymization based on anonymous flow table
Published 2016-11-01“…Tongxin xuebao…”
Get full text
Article -
7679
-
7680