China Communications
COMMUNICATIONS THEORIES & SYSTEMS
- Personalized Query Recommendation Using Semantic Factor Model
- τ-Access Policy:Attribute-Based Encryption Scheme for Social Network Based Data Trading
- Single-Site Indoor Fingerprint Localization Based on MIMO-CSI
- Design and Analysis of Spatial Modulation Based Orthogonal Time Frequency Space System
- QMCR:A Q-Learning-Based Multi-Hop Cooperative Routing Protocol for Underwater Acoustic Sensor Networks
- A Novel Robust Zero-Watermarking Algorithm for Audio Based on Sparse Representation
- Achieving Energy Efficiency in Wireless Sensor Networks Using Dynamic Channel Polling and Packet Concatenation
- A Log-Penalty-Based Method for Multi-Parameters Estimation with Partly Calibrated COLD Array
EMERGING TECHNOLOGIES & APPLICATIONS
- Blockchain and MEC-Assisted Reliable Billing Data Transmission over Electric Vehicular Network:An Actor–Critic RL Approach
- C-V2X Equipment Identification Management and Authentication Mechanism
- Research on Intelligent Logic Design and Application of Campus MMTC Scene Based on 5G Slicing Technology
- Two-Timescale Online Learning of Joint User Association and Resource Scheduling in Dynamic Mobile EdgeComputing
FEATURE TOPIC:ADVANCED COMPUTING AND ENDOGENOUS SECURITY
- SHFuzz:A Hybrid Fuzzing Method Assisted by Static Analysis for Binary Programs
- SecIngress:An API Gateway Framework to Secure Cloud Applications Based on N-Variant System
- Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization
- A Safe and Reliable Heterogeneous Controller Deployment Approach in SDN
- Distributed Asynchronous Learning for Multipath Data Transmission Based on P-DDQN
- A Fast Physical Layer Security-Based Location Privacy Parameter Recommendation Algorithm in 5G IoT
- SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
- On Distributed Object Storage Architecture Based on Mimic Defense
- GUEST EDITORIAL
- Preventing Hardware Trojans in Switch Chip Based on Payload Decoupling