[1] |
WAN Pengwu,YAO Yuanyuan,YAN Qianli,CHEN Yufei.
Passive localization based on energy-time-frequency information fusion
[J]. Journal of Xidian University, 2021, 48(6): 105-114.
|
[2] |
DAI Mingjun,LI Xiaofeng,DENG Haiyan,CHEN Bin.
Private information retrieval with low encoding/decoding complexity
[J]. Journal of Xidian University, 2021, 48(6): 212-220.
|
[3] |
YANG Yanbo,ZHANG Jiawei,MA Jianfeng.
Method for using the blockchain to protect data privacy of IoV
[J]. Journal of Xidian University, 2021, 48(3): 21-30.
|
[4] |
LIU Huayuan,SU Yunfei,LI Ruilin,TANG Chaojing.
Structure-statebased graybox Fuzzing technique
[J]. Journal of Xidian University, 2021, 48(1): 117-123.
|
[5] |
LI Teng,CAO Shijie,YIN Siwei,WEI Dawei,MA Xindi,MA Jianfeng.
Optimal method for the generation of the attack path based on the Q-learning decision
[J]. Journal of Xidian University, 2021, 48(1): 160-167.
|
[6] |
YANG Hongyu,ZENG Renyun.
Method for assessment of network security situation with deep learning
[J]. Journal of Xidian University, 2021, 48(1): 183-190.
|
[7] |
XU Zhicheng,LI Xiang,MAO Jian,LIU Jianwei,ZHOU Zhihong.
Overview of Sybil attacks and defenses in the distributed architecture
[J]. Journal of Xidian University, 2021, 48(1): 39-49.
|
[8] |
ZHANG Lu,SUN Rong,LIU Jingwei.
Cloned piggybacking framework for distributed storage
[J]. Journal of Xidian University, 2020, 47(6): 139-147.
|
[9] |
ZHAI Sheping,WANG Yijing,CHEN Siji.
Research on the application of blockchain technology in the sharing of electronic medical records
[J]. Journal of Xidian University, 2020, 47(5): 103-112.
|
[10] |
LIU Naian,CHEN Zhihao,LIU Guokun,LI Yang.
Mechanism for proof-of-reputation consensus for blockchain validator nodes
[J]. Journal of Xidian University, 2020, 47(5): 57-62.
|
[11] |
XIE Yixi,JI Lixin.
Blockchain-based bio-inspired distributed detection approach
[J]. Journal of Xidian University, 2020, 47(5): 70-76.
|
[12] |
SHU Xinfeng,WANG Changtai,WANG Yan,ZHANG Lili.
Propositional projection temporal logic based distributed model checking method
[J]. Journal of Xidian University, 2020, 47(4): 39-47.
|
[13] |
YANG Hongyu,ZHANG Xugao.
Network security situation adaptive prediction model
[J]. Journal of Xidian University, 2020, 47(3): 14-22.
|
[14] |
XIE Lixia,WEI Ruixin.
IoT Node trust comprehensive evaluation model
[J]. Journal of Xidian University, 2019, 46(4): 58-65.
|
[15] |
YAN Qianli,WAN Pengwu,LU Guangyue,HUANG Qiongdan,WANG Jin,LI Yixiao.
Passive localization of the signal source based on RSS and TDOA combination in the non-line-of-sight environment
[J]. Journal of Xidian University, 2019, 46(3): 180-188.
|