nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Attribute-based encryption resilient to continual auxiliary leakage with constant size ciphertexts
|
Leyou, Zhang |
|
2016 |
23 |
3 |
p. 18-28 11 p. |
artikel |
2 |
Fine-grained analysis of cellular smartphone usage characteristics based on massive network traffic
|
Xiaolin, Gui |
|
2016 |
23 |
3 |
p. 70-75 6 p. |
artikel |
3 |
First-Feed LSTM model for video description
|
Yue, Wang |
|
2016 |
23 |
3 |
p. 89-93 5 p. |
artikel |
4 |
Improved lattice-based ring signature schemes from basis delegation
|
Wen, Gao |
|
2016 |
23 |
3 |
p. 11-17 7 p. |
artikel |
5 |
Interference-aware resource allocation algorithm in multicarrier-based cognitive radio networks
|
Ling, Zhuang |
|
2016 |
23 |
3 |
p. 37-44 8 p. |
artikel |
6 |
Interference cancellation method based on space-time code for MIMO interference channel
|
Dong, Yang |
|
2016 |
23 |
3 |
p. 45-50 6 p. |
artikel |
7 |
Numerical simulation and experiment validation on lightning-induced effects of a special vehicle
|
Ping, Zhou |
|
2016 |
23 |
3 |
p. 76-88 13 p. |
artikel |
8 |
Performance measurement of adaptive optics system based on Strehl ratio
|
Liang, Wang |
|
2016 |
23 |
3 |
p. 94-100 7 p. |
artikel |
9 |
Resource allocation scheme based on game theory in heterogeneous networks
|
Yalong, Wu |
|
2016 |
23 |
3 |
p. 57-62 6 p. |
artikel |
10 |
Secrecy outage analysis on underlay cognitive radio using selection combining
|
Youyu, Tan |
|
2016 |
23 |
3 |
p. 51-56 6 p. |
artikel |
11 |
Secure oblivious transfer protocol from indistinguishability obfuscation
|
Zheng, Yuan |
|
2016 |
23 |
3 |
p. 1-10 10 p. |
artikel |
12 |
ULM: A user-level model for emotion prediction in social networks
|
Qiyao, Wang |
|
2016 |
23 |
3 |
p. 63-69 7 p. |
artikel |
13 |
User abnormal behavior analysis based on neural network clustering
|
Ruijuan, Zheng |
|
2016 |
23 |
3 |
p. 29-36 8 p. |
artikel |