[1] |
Zheng Lin, Wang Zhen, Chen Jianmei, Lin Mengying, Deng Xiaofang.
MIMO-FSK non-coherent detection with spatial multiplexing in fast-fading environment
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(5): 47-54.
|
[2] |
Li Li, Zheng Jiali, Quan Yixuan, Lin Zihan, Li Yingchao, Huang Tianxing.
RFID Indoor positioning based on Semi-supervised Actor-Critic Co-training
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(5): 69-81.
|
[3] |
Li Yanhua, Xiao Wenguang.
Enhancement network: confining deep convolutional features based on hand-crafted rules
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(4): 34-42.
|
[4] |
Shang Yujie, Zhang Leyou, Gao Xiaoxu.
Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(4): 69-82.
|
[5] |
Ying-Lin HOU Wei-Qing CHENG.
Task allocation based on profit maximization for mobile crowdsourcing
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2020, 27(1): 26-37.
|
[6] |
Song Da1, Fu Xiong1,Zhou Jingjing2, Wang Junchang1, Zhang Lin1, Deng Song3, Qiao Lei4.
VM migration algorithm for the balance of energy resource across data centers in cloud computing
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2019, 26(5): 22-32.
|
[7] |
Li Lintao, Liu Yuanan.
Physical layer security enhanced system with
under-sampling spectrum-sparse signals
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2019, 26(4): 8-16.
|
[8] |
Tang Yongli, Wang Mingming, Ye Qing, Qin Panke, Zhao Zongqu.
Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2019, 26(4): 70-79.
|
[9] |
Yi-Lei CUI Le-You Zhang.
Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2019, 26(1): 21-31.
|
[10] |
.
Two-party certificateless authenticated key agreement protocol with enhanced security
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2019, 26(1): 12-20.
|
[11] |
.
Wideband CMOS variable gain amplifier with decibel-linear gain control characteristic
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2019, 26(1): 59-64.
|
[12] |
He Jin, Wang Cong, Chen Zhao.
Pulmonary tuberculosis detection model of chest X-ray images using convolutional neural network
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(6): 1-6.
|
[13] |
Luo Yan, Sun Yawei, Fu Qunchao, Xue Tengfei, Zhou Ping.
Comparison of three data mining methods in predicting 5-year survival of colorectal cancer patients
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(6): 65-73.
|
[14] |
Yang Jinsheng, Xiang Yang, Chen Weigang, Dong Yangyang.
Computationally efficient 2-D DOA estimation for non-uniform two-L-shaped array
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(6): 81-89.
|
[15] |
.
Compatible-invariant subset analysis of deterministic finite automata via semi-tensor product of matrices approach
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(5): 75-82.
|