Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2016 Issue 8
Hybrid data synchronization mechanism for mobile computing
XU Xiao-long;LIU Xiao-xiao;College of Computer;Nanjing University of Posts and Telecommunications;
..............page:1-12
IP network congested link inference based on variable structure discrete dynamic Bayesian
CHEN Yu;ZHOU Wei;DUAN Zhe-min;QIAN Ye-kui;ZHAO Xin;School of Electronic Information;Northwestern Polytechnical University;School of Electronics and Communication Engineering;Zhengzhou University of Aeronautics;Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory;Department of Missile;Air Defence Forces Academy of PLA;Department of Antiaircraft Gun-Missile System;Air Defense Forces Academy of PLA;
..............page:13-23
Feature importance analysis for spammer detection in Sina Weibo
ZHANG Yu-xiang;SUN Yu;YANG Jia-hai;ZHOU Da-lei;MENG Xiang-fei;XIAO Chun-jing;College of Computer Science;Civil Aviation University of China;Institute for Network Sciences and Cyberspace;Tsinghua University;Tsinghua National Laboratory for Information Science and Technology;Institue of Network Technology;Beijing University of Posts and Telecommunications;State Key Laboratory of Virtual Reality Technology and Systems;Beihang University;
..............page:24-33
Dynamic P2P trust model based on context factors
LIU Yi-chun;LIANG Ying-hong;Information School;Guangdong University of Finance and Economic;
..............page:34-45
Trojan message attack on the concatenated hash functions
CHEN Shi-Wei;JIN Chen-Hui;The Third College;PLA Information Engineering University;Science and Technology on Information Assurance Laboratory;
..............page:46-50
Virtual network mapping algorithm with node reliability awareness and shared-path protection
LIU Guang-yuan;AN Xiu-fang;SU Sen;School of Information Science and Technology;Shijiazhuang Tiedao University;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:51-57
False traffic information detection based on weak classifiers integration in vehicular ad hoc networks
LIU Xiang-wen;SHI Ya-li;FENG Xia;School of Computer Science and Communication Engineering;Jiangsu University;Information Assurance Technology Collaborative Innovation Center;Anhui University;
..............page:58-66
Location-semantic-based location privacy protection for road network
CHEN Hui;QIN Xiao-lin;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;School of Electronic and Information Engineering;Nanjing University of Information Science and Technology;Jiangsu Key Laboratory of Internet of Things and Control Technology;
..............page:67-76
Attribute-based encryption supporting arbitrary conjunctive key word search
SONG Yan;HAN Zhen;CHEN Dong;ZHAO Jin-hua;School of Computer and Information Technology;Beijing Jiaotong University;Technology on Information Assurance Key Laboratory;
..............page:77-85
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
CHEN Ya-jun;JI Xin-sheng;HUANG Kai-zhi;KANG Xiao-lei;National Digital Switching System Engineering and Technological Research Center;National Mobile Communications Research Laboratory;Southeast University;National Engineering Lab for Mobile Networking Security;
..............page:86-94
Long-term intuitionistic fuzzy time series forecasting model based on DTW
FAN Xiao-shi;LEI Ying-jie;LU Yan-li;WANG Ya-nan;Air and Missile Defense College;Air Force Engineering University;
..............page:95-104
Study on virtual computing resource scheduling for network performance optimization
WANG Yu-wei;LIU Min;FANG Bing-yi;QIN Chen-chong;YAN Xiao-long;Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;China Unicom;
..............page:105-118
Routing discovery algorithm based on reliable path stability estimation in MANET
LI Zhi-nan;YANG Xiao-dong;College of Information and Communication Engineering;Harbin Engineering University;Collaborative Research Center;Meisei University;
..............page:119-128
374~747 MHz digital tunable microstrip filter
TIAN Deng-yao;FENG Quan-yuan;XIANG Qian-yin;Institute of Microelectronics;Southwest Jiaotong University;
..............page:129-135
Privacy matching-based service proxy discovery scheme
GENG Kui;WAN Sheng;LI Feng-hua;HE Yuan-yuan;WANG Han-yi;State Key Laboratory of Integrated Service Networks;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;CAS;
..............page:136-143
Improvement and evaluation for algebraic fault attacks on PRESENT
HUANG Jing;ZHAO Xin-jie;ZHANG Fan;GUO Shi-ze;ZHOU Ping;CHEN Hao;YANG Jian;Third Department of No.61541 Unit;The Institute of North Electronic Equipment;College of Information Science & Electrical Engineering;Zhejiang University;Science and Technology on Communication Security Laboratory;Department of Information Engineering;Ordnance Engineering College;
..............page:144-156
Vulnerabilities scoring approach for cloud SaaS
LI Zhou;TANG Cong;HU Jian-bin;CHEN Zhong;School of EECS;Peking University;
..............page:157-166
Research progress on cloud data assured deletion based on cryptography
XIONG Jin-bo;LI Feng-hua;WANG Yan-chao;MA Jian-feng;YAO Zhi-qiang;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Faculty of Software;Fujian Normal University;School of Computer Science and Technology;Xidian University;
..............page:167-184
Meet-in-the-middle attacks on FOX block cipher
LI Rong-jia;JIN Chen-hui;The Third College;PLA Information Engineering University;
..............page:185-190
Chaotic hiding and its positive definite blind extraction algorithm of speech signal
WANG Er-fu;ZHENG Yuan-shuo;CHEN Xin-wu;LIU Xiao-zhen;Electronic Engineering College;Heilongjiang University;
..............page:191-198