Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Journal on Communications
FQ: 月刊
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1000-436X
CN: 11-2102/TN
YP: 1980
Url: 中国通信学会
Recommended Journals
Journal on Communications
2018 -05
Catalog
Multi-label feature selection algorithm based on joint mutual information of max-relevance and min-redundancy ZHANG Li;WANG Cong;School of Software, Beijing University of Posts and Telecommunications;Key Laboratory of Trustworthy Distributed Computing and Service of Ministry of Education,Beijing University of Posts and Telecommunications;
Research on cloud computing users' public safety trust model based on scorecard-random forest ZHOU Shengli;JIN Canghong;WU Lifa;HONG Zheng;Institute of Command and Control Engineering, Army Engineering University of PLA;Department of Information, Zhejiang Police College;School of Computer and Computing Science, Zhejiang University City College;
Algorithm for scenario benefit route planning based on user's requests WANG Nan;ZHOU Honglei;LI Jinbao;LI Lingli;Key Laboratory of Database and Parallel Computing of Heilongjiang Province (Heilongjiang University);School of Electronic Engineering, Heilongjiang University;School of Computer Science and Technology, Heilongjiang University;
Detection method of LDoS attacks based on combination of ANN & KPCA WU Zhijun;LIU Liang;YUE Meng;School of Electronics Information & Automation, Civil Aviation University of China;
Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence XIAO Bin;SHI Wenming;LI Weisheng;MA Jianfeng;Chongqing Key Laboratory of Computational Intelligence, Chongqing University of Posts and Telecommunications;School of Computer Science and Technology, Xidian University;
Security analysis of weighted network anonymity based on singular value decomposition ZENG Yong;ZHOU Lingjie;JIANG Zhongyuan;LIU Zhihong;MA Jianfeng;School of Cyber Engineering, Xidian University;
Cloud data secure deduplication scheme via role-based symmetric encryption XIONG Jinbo;ZHANG Yuanyuan;TIAN Youliang;YING Zuobin;LI Qi;MA Rong;Guizhou Provincial Key Laboratory of Public Big Data (Guizhou University);College of Mathematics and Informatics, Fujian Normal University;College of Computer Science and Technology, Anhui University;School of Computer Science, Nanjing University of Posts and Telecommunications;
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing LIN Hui;YU Mengyang;TIAN Youliang;HUANG Yijie;College of Mathematics and Informatics, Fujian Normal University;Guizhou Provincial Key Laboratory of Public Big Data (Guizhou University);
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key YAN Xincheng;CHEN Yue;JIA Hongyong;CHEN Yanru;ZHANG Xinyue;School of Data and Target Engineering, PLA Information Engineering University;School of Software and Applied Technology, Zhengzhou University;The First Research Institute of the Ministry of Public Security;
Spatio-temporal aware privacy-preserving scheme in LBS LI Weihao;DING Sheng;MENG Jiajie;LI Hui;School of Cyber Engineering, Xidian University;
Concepts,issues,and applications of fog computing JIA Weijia;ZHOU Xiaojie;School of Electronic, Information and Electrical Engineering, Shanghai Jiaotong University;
Joint admission control algorithm based on load transfer in heterogeneous networks XIA Weiwei;DING Zhaoming;SHEN Lianfeng;National Mobile Communications Research Laboratory, Southeast University;
Secure and efficient token based roaming authentication scheme for space-earth integration network XUE Kaiping;MA Yongjin;HONG Jia'nan;XU Jie;YANG Qingyou;Department of Electronic Engineering and Information Science, University of Science and Technology of China;
Pseudo 4D projective coordinate-based multi-base scalar multiplication XU Ming;SHI Liang;College of Information Engineering, Shanghai Maritime University;College of Electronics and Information Engineering, Tongji University;
Key storage management scheme based on keyed hash tree with state WANG Xiangyu;MA Jianfeng;MIAO Yinbin;ZHANG Kai;WU Qiying;School of Cyber Engineering, Xidian University;
Automatic method for searching integral distinguishers of ARX block ciphers HAN Ya;WANG Mingsheng;State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;
Nondata-aided error vector magnitude performance analysis over κ-μ shadowed fading channel YANG Fan;ZENG Xiaoping;MAO Haiwei;JIAN Xin;DU Derong;TAN Xiaoheng;GAO Yiwen;The College of Communication Engineering, Chongqing University;Chongqing Jinmei Communication Co., Ltd.;China Mobile Group Chongqing Co., Ltd.;
Reliability modeling and planning of energy harvesting based on uncertainty theory WANG Zhe;LI Taoshen;YE Jin;GE Zhihui;WU Min;College of Electrical Engineering, Guangxi University;School of Computer, Electronics and Information, Guangxi University;Guangxi Power Grid Co., Ltd.;
2018 Issues:  [01]
More Issues:   [1990]   [1991]   [1992]   [1993]   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved