Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The Journal of China Universities of Posts and Telecommunications
1005-8885
2016 Issue 3
Secure oblivious transfer protocol from indistinguishability obfuscation
Yuan Zheng;Wang Mei;Feng Xiao;Beijing Electronic Science & Technology Institute;School of Telecommunications Engineering;Xidian University;
..............page:1-10
Improved lattice-based ring signature schemes from basis delegation
Gao Wen;Hu Yupu;Wang Baocang;Xie Jia;State Key Laboratory of Integrated Service Networks;Xidian University;
..............page:11-17+28
Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts
Zhang Leyou;Zhang Jingxia;Hu Yupu;School of Mathematics and Statistics;Xidian University;School of Telecommunications Engineering;Xidian University;
..............page:18-28
User abnormal behavior analysis based on neural network clustering
Zheng Ruijuan;Chen Jing;Zhang Mingchuan;Zhu Junlong;Wu Qingtao;College of Information Engineering;Henan University of Science and Technology;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:29-36+44
Interference-aware resource allocation algorithm in multicarrier-based cognitive radio networks
Zhuang Ling;Ma Long;Chongqing Key Laboratory of Mobile Communication;Chongqing University of Posts and Communications;
..............page:37-44
Interference cancellation method based on space-time code for MIMO interference channel
Yang Dong;Tian Xinji;Opening Project of Key Laboratory of Mine Informatization;Henan Polytechnic University;School of Computer Science and Technology;Henan Polytechnic University;
..............page:45-50
Secrecy outage analysis on underlay cognitive radio using selection combining
Tan Youyu;Pan Gaofeng;Zhao Hui;School of Electronic and Information Engineering;Southwest University;
..............page:51-56
Resource allocation scheme based on game theory in heterogeneous networks
Wu Yalong;Li Xi;Zhang Heli;Wang Ke;Laboratory of Universal Wireless Communications;Ministry of Education;Beijing University of Posts and Telecommunications;
..............page:57-62+88
ULM: A user-level model for emotion prediction in social networks
Wang Qiyao;Li Zhengmin;Jin Yuehui;Cheng Shiduan;Yang Tan;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;National Computer Network Emergency Response Technical Team/Coordination Center of China;School of Software Engineering;Beijing University of Posts and Telecommunications;
..............page:63-69+88
Fine-grained analysis of cellular smartphone usage characteristics based on massive network traffic
Gui Xiaolin;Liu Jun;Li Chenyu;Lü Qiujian;Lei Zhenming;Beijing Key Laboratory of Network System Architecture and Convergence;Beijing University of Posts and Telecommunications;
..............page:70-75
Numerical simulation and experiment validation on lightning-induced effects of a special vehicle
Zhou Ping;Lü Yinghua;Tao Yong;Xu Hongping;School of Electronic Engineering;Beijing University of Posts and Telecommunications;Institute of Astronautic System Engineering;
..............page:76-88
First-Feed LSTM model for video description
Wang Yue;Wang Xiaojie;Mao Yuzhao;School of Computer Science;Beijing University of Posts and Telecommunications;
..............page:89-93
Performance measurement of adaptive optics system based on Strehl ratio
Wang Liang;Chen Tao;Lin Xudong;Wei Peifeng;Liu Xinyue;Jia Jianlu;Changchun Institute of Optics;Fine Mechanics and Physics;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:94-100