Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2016 Issue 11
Efficient and secure message authentication scheme for VANET
WU Li-bing;XIE Yong;ZHANG Yu-bo;School of Computer Science;Wuhan University;School of Information and Engineering;Jingdezhen Ceramic Institute;State Key Laboratory of Software Engineering;Wuhan University;
..............page:1-10
Online trace anonymization based on anonymous flow table
HAN Chun-jing;GE Jing-guo;XIE Gao-gang;LI Liang-xiong;LI Tong;LIU Yun-jie;Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:11-22
Dynamic adaptive discrete particle swarm optimization algorithm based method on low-power mapping in network-on-chip
LIU Qin-rang;DAI Qi-hua;SHEN Jian-liang;ZHAO Bo;National Digital Switching System Engineering & Research Center;
..............page:23-30
Location privacy preservation approach towards to content sharing on mobile online social network
LI Chao;YIN Li-hua;GENG Kui;FANG Bin-xing;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Institute of Electronic and Information Engineering;University of Electronic Science and Technology of China in Dongguan;
..............page:31-41
Connectivity analysis of passive cluster with high stability in vehicular wireless network
QIU Gong-an;BAO Zhi-hua;ZHANG Guo-an;ZHANG Shi-bing;School of Electronics and Information;Nantong University;
..............page:42-48
Dynamic and adaptive access control model
SHI Guo-zhen;WANG Hao-jie;CI Yun-fei;YE Si-shui;GUO Yun-chuan;School of Information Security;Beijing Electronic Science and Technology Institute;School of Computer Science and Technology;Xidian University;School of Telecommunications Engineering;Xidian University;Dept.of House Technology;Ruiting Networking Technology Co;Ltd.;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:49-56
Regularized manifold information extreme learning machine
LIU De-shan;CHU Yong-he;YAN De-qin;College of Computer and Information Technology;Liaoning Normal University;
..............page:57-67
Research on human blockage effect for indoor 26 GHz mm-wave communications
GENG Sui-yan;LI Xing;WANG Qi;WANG Guang-bo;WANG Meng-jun;SUN Shao-hui;HONG Wei;ZHAO Xiong-wen;School of Electrical and Electronic Engineering;North China Electric Power University;State Key Laboratory of Wireless Mobile Communications;China Academy of Telecommunications Technology;State Key Laboratory of Millimeter Wave;Southeast University;
..............page:68-73
Research of compressed sensing for predistortion with relatively low sampling frequency
HU Xin;WANG Jian-kang;LIU Fei;OU Lian-jun;LIANG Jun;WANG Gang;LUO Ji-run;Research & Development Center of China Academy of Launch Vehicle Technology;Institute of Electronics;Chinese Academy of Sciences;
..............page:74-79
Bankline extraction in remote sensing images using principal curves
GUO Yun;WANG Yi-huai;LIU Chun-ping;GONG Sheng-rong;JI Yi;School of Computer Science and Technology;Soochow University;Collaborative Innovation Center of Novel Software Technology and Industrialization;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;School of Computer Science and Engineering;Changshu Institute of Technology;
..............page:80-89
Balanced multiple controllers placement with latency and capacity bound in software-defined network
QIN Kuang-yu;HUANG Chuan-he;WANG Cai-hua;SHI Jiao-li;WU Di;CHEN Xi;State Key Lab of Software Engineering;Computer School;Wuhan University;Collaborative Innovation Center of Geospatial Technology;Wuhan University;School of Information Science and Technology;Jiujiang University;
..............page:90-103
Fast reused code tracing method based on simhash and inverted index
QIAO Yan-chen;YUN Xiao-chun;TUO Yu-peng;ZHANG Yong-zheng;Institute of Computing Technology;Chinese Academy of Sciences;Graduate School;Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:104-113
Using deep learning for detecting Bot Cloud
KOU Guang;TANG Guang-ming;WANG Shuo;SONG Hai-tao;BIAN Yuan;PLA Information Engineering University;Science and Technology on Information Assurance Laboratory;
..............page:114-128
Human personality privacy analysis based on visual features
NIE Jie;HUANG Lei;LI Zhen;ZHANG Jian;YAN Yan;WEI Zhi-qiang;Department of Computer Science and Technology;Tsinghua University;College of Information Science and Engineering;Ocean University of China;
..............page:129-136
Study on authority watermark of the electronic chart based on the semantics characteristics
LAI Ming-zhu;ZHANG Li-guo;FENG Wei-miao;WANG Yuan-yuan;WANG Yong;LI Shou-zheng;College of Computer Science and Technology;Harbin Engineering University;School of Software;Harbin University of Science and Technology;Institute of Information Engineering;Chinese Academy of Sciences;School of Mechatronics Engineering;Northeast Forestry University;
..............page:137-145
Anti-packet-loss joint encoding for voice-over-IP steganography
GAO Zhan-zhan;TANG Guang-ming;ZHANG Wei-wei;PLA Information Engineering University;Graduate Brigade;PLA University of Foreign Languages;
..............page:146-155
Research status and development trends of security assurance for space-ground integration information network
LI Feng-hua;YIN Li-hua;WU Wei;ZHANG Lin-jie;SHI Guo-zhen;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;CETC 54;Department of Information Security;Beijing Electronic Science and Technology Institute;
..............page:156-168
Research progress on secure data deduplication in cloud
XIONG Jin-bo;ZHANG Yuan-yuan;LI Feng-hua;LI Su-ping;REN Jun;YAO Zhi-qiang;Faculty of Software;Fujian Normal University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;Fujian Engineering Research Center of Public Service Big Data Mining and Application;
..............page:169-180
Multi-class support vector machine-based fast algorithm for 3D-HEVC depth video intra coding
LIU Sheng;PENG Zong-ju;CHEN Jia-li;CHEN Fen;YU Mei;JIANG Gang-yi;Faculty of Information Science and Engineering;Ningbo University;
..............page:181-188
Zero correlation-integral attack of MIBS block cipher
LIU Qing-cong;ZHAO Ya-qun;MA Meng;LIU Feng-mei;State Key Laboratory of Mathematical Engineering and Advanced Computing;Information Engineering University;Science and Technology on Information Assurance Laboratory;
..............page:189-195
Formal verification and implementation of safety computer communication management mechanism
LIANG Liang;CAO Yuan;MA Lian-chuan;ZHANG Yu-zhuo;LI Heng-kui;School of Electronic and Information Engineering;Beijing Jiaotong University;National Engineering Research Center of Rail Traffic Control System;Beijing Jiaotong University;CRCC Qingdao Sifang Co.;Ltd.;
..............page:196-202