-
7881
Cloud outsourcing secret sharing scheme against covert adversaries
Published 2017-05-01“…Tongxin xuebao…”
Get full text
Article -
7882
-
7883
-
7884
Turbo equalization and its improvement in BICM-ID based on hard-decision
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
7885
-
7886
Secure video watermarking scheme for broadcast monitoring
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
7887
Research on self-training neural machine translation based on monolingual priority sampling
Published 2024-04-01“…Tongxin xuebao…”
Get full text
Article -
7888
-
7889
-
7890
Fastly match threat response policies based on interval decision diagram
Published 2021-05-01“…Tongxin xuebao…”
Get full text
Article -
7891
-
7892
Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network
Published 2023-04-01“…Tongxin xuebao…”
Get full text
Article -
7893
Multi-dimensional secure query scheme for fog-enhanced IIoT
Published 2020-08-01“…Tongxin xuebao…”
Get full text
Article -
7894
-
7895
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01“…Tongxin xuebao…”
Get full text
Article -
7896
Novel DS/SSMA Systems with Trellis-Coded Sequence and Phase Modulation
Published 1995-01-01“…Tongxin xuebao…”
Get full text
Article -
7897
-
7898
Delay-sensitive data allocation scheme for CMT over diversity paths
Published 2013-04-01“…Tongxin xuebao…”
Get full text
Article -
7899
Study of single image dehazing algorithm based on propagated filtering and minimum color channels
Published 2017-01-01“…Tongxin xuebao…”
Get full text
Article -
7900
Research progress on location privacy-preserving techniques
Published 2016-12-01“…Tongxin xuebao…”
Get full text
Article