default search action
International Journal of Autonomous and Adaptive Communications Systems, Volume 14
Volume 14, Numbers 1/2, 2021
- Wei Ou, Qin Yi, Jiao Hu, Dingwan Liu, Wei Liu, Wanqin Yan:
An attribute-based cross-domain trustworthy model for internet of vehicles. 4-27 - Jing Zhou, Chen Chen, Yurong Guan:
The cross-layer oriented security performance to wireless network fibre communication router: the optimisation perspective. 28-47 - Shi Min:
SIP network secure communication model based on improved SIP protocol. 48-63 - Kun Li, Jichao Liu:
A security protocol of RFID communication system based on password authenticated with provable security. 64-82 - Xiaoshu Ma, Qing Liu:
Security model and design of network communication system based on data encryption algorithm. 83-97 - Bin Wu:
Connection-oriented computer network secure communication and encryption algorithm. 98-116 - Yaru Su, Yanming Ye, Shuhao Chen, Wenshuo Yang:
A hybrid chemical reaction optimisation algorithm for solving 3D packing problem. 117-131 - Liyan Chen:
A channel estimation algorithm for large-scale MIMO system using block sparsity adaptive matching pursuit. 132-150 - Min Long, Sai Long, Fei Peng, Xiao-hua Hu:
Identifying natural images and computer-generated graphics based on convolutional neural network. 151-162 - Zhiyu Jian, Yiwei Jian:
A HDFS dynamic load balancing strategy using improved niche PSO algorithm in cloud storage. 163-178 - Xiaozhi Zhang:
End-to-end encrypted communication security technology for mobile terminals. 179-195 - Shanshan Li:
A new signcryption algorithm for secure communication in ad hoc networks. 196-212 - Xuhong Li, Guan Wang, Wenwen Pan:
Research on the application of data encryption technology in communication security. 213-230
Volume 14, Number 3, 2021
- Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké:
Context-aware security in the internet of things: a survey. 231-263 - Zirong Hong, Hu Cai, Jian Wu:
Intelligence-oriented industrial internet of things: architecture, key technologies and challenges. 264-278 - Wanggong Yang, Mingzhi Cheng:
Scheduling algorithm of sensor network node based on artificial neural network. 279-290 - Ayoub Benayache, Azeddine Bilami, Khaled Benaggoune, Hayet L. Mouss:
Industrial IoT middleware using a multi-agent system for consistency-based diagnostic in cement factory. 291-310
Volume 14, Number 4, 2021
- Junbin Cui, Nie Shengyang, Ji Chunhua, Xintong Liu:
Research on IMS equalisation switching algorithm in power network. 311-322 - Jibao Hu, Quanjin Liu, Jun Xie:
Modelling of power attenuation in optical communication based on Monte Carlo method. 323-341 - Yichao Li, Lei Zhang, Jinci Yi, Jun Wang:
Research on the application of network intrusion feature extraction in power network. 342-353 - Jie Zhou, Yingjie Jiang, Bintai Xu, Liang Ma, Xinquan Lv:
Research on protection of vulnerable nodes in power communication network based on the model of invalid proximity of edge. 354-370 - Jie Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yuzhen Lin:
Towards breaking DNN-based audio steganalysis with GAN. 371-383 - Yanjun Sun, Haiyan Zhao, Juanjuan Liu:
Research on error compensation method of encoder signal based on cloud computing. 384-397 - Furong Li, Kaibin Wei:
Study on social network recommendation service method based on mobile cloud computing. 398-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.