[1] |
Yang Chao, Li Yimin, Li Tong, Xu Siya, Qi Jun, Zhang Yu.
Intelligent Service Function Chain Mapping Framework for Cloud-and-Edge-Collaborative IoT
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(3): 54-68.
|
[2] |
Yao Shengshi, Wang Sixian, Dai Jincheng, Niu Kai, Xu Wenjun, Zhang Ping.
Semantic information processing in industrial networks
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(1): 41-49.
|
[3] |
Tang Fei, Dong Kun, Ye Zhangtao, Ling Guowei.
Authentication scheme for industrial Internet of things based on DAG blockchain
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(6): 1-12.
|
[4] |
Tao Yunting, Kong Fanyu, Yu Jia.
EPMDA: an efficient privacy-preserving multi-dimensional data aggregation scheme for edge computing-based IoT system
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(6): 26-35.
|
[5] |
Xu Yan, Li Zheng, Ding Long, Xu Rui.
Cross-domain data cloud storage auditing scheme based on certificateless cryptography
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(6): 36-47.
|
[6] |
Kang Mancong, Li Xi, Ji Hong, Zhang Heli.
Resource allocation and hybrid prediction scheme for low-latency visual feedbacks to support tactile Internet multimodal perceptions
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(4): 13-28.
|
[7] |
.
Imp Raft: a consensus algorithm based on Raft and storage compression consensus for IoT scenario
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(3): 53-61.
|
[8] |
Peng Weiping, Su Zhe, Song Cheng, Jia Zongpu.
Research on adaptive dual task offloading decision algorithm for parking space recommendation service
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(6): 30-42.
|
[9] |
Wei Feng, Zou Weixia, Wang Zhen, Wu Xiaomei.
Distance control strategy for deploying content replica servers in an edge cloud
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(2): 91-98.
|
[10] |
.
Software defined industrial network architecture for edge computing offloading
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(1): 49-58.
|
[11] |
Tian Shengwen, Wang Jingyu, Yang Hongyong, Cui Guanghai.
Stateless overlay multicast with in-packet bloom filters
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2017, 24(5): 44-52.
|
[12] |
.
User abnormal behavior analysis based on neural network clustering
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2016, 23(3): 29-36.
|
[13] |
GUO Cong, ZHANG Zi-jian, ZHU Lie-huang, TAN Yu-an, YANG Zhen.
A novel secure group RFID authentication protocol
[J]. Acta Metallurgica Sinica(English letters), 2014, 21(1): 94-103.
|
[14] |
Zhen Liu Qiong Liu.
Studying cost-sensitive learning for multi-class imbalance in Internet traffic classification
[J]. Acta Metallurgica Sinica(English letters), 2012, 19(6): 63-72.
|
[15] |
.
New concurrent digital signature scheme based on the computational Diffie-Hellman problem
[J]. Acta Metallurgica Sinica(English letters), 2010, 17(6): 89-94.
|