[1] |
YANG Howard H., ZHAO Zhongyuan, QUEK Tony Q. S..
Enabling Intelligence at Network Edge:An Overview of Federated Learning
[J]. ZTE Communications, 2020, 18(2): 2-10.
|
[2] |
TANG Kai.
Risk Analysis of Industrial InternetIdentity System
[J]. ZTE Communications, 2020, 18(1): 44-48.
|
[3] |
MA Baoluo, CHEN Wenqu, CHI Cheng.
Security Risk Analysis Model for Identification and Resolution System of Industrial Internet
[J]. ZTE Communications, 2020, 18(1): 49-54.
|
[4] |
ZHANG Yunyong, XU Lei, TAO Ye.
SDN Based Security Services
[J]. ZTE Communications, 2018, 16(4): 9-14.
|
[5] |
WANG Hua, ZHAO Yongli, WANG Dajiang, WANG Jiayu, WANG Zhenyu.
A Quantum Key Re-Transmission Mechanism for QKD-Based Optical Networks
[J]. ZTE Communications, 2018, 16(3): 52-58.
|
[6] |
HU Baiqing, WANG Wenjie, Chi Harold Liu.
Open Source Initiatives for Big Data Governance and Security: A Survey
[J]. ZTE Communications, 2018, 16(2): 55-66.
|
[7] |
LI Gang, XU Rui, LI Zhenbing, ZHOU Jie, LI Jian, WEN Guangjun.
Design of Wireless Energy-Harvested UHF WSN Tag for Cellular IoT
[J]. ZTE Communications, 2018, 16(1): 11-17.
|
[8] |
Alexander A. Okandeji, Muhammad R. A. Khandaker, WONG Kai-Kit, ZHANG Yangyang, ZHENG Zhongbin.
Secure Beamforming Design for SWIPT in MISO Full-Duplex Systems
[J]. ZTE Communications, 2018, 16(1): 38-46.
|
[9] |
MENG Ziqian, GUAN Zhi, WU Zhengang, LI Anran, CHEN Zhong.
Security Enhanced Internet of Vehicles with Cloud-Fog-Dew Computing
[J]. ZTE Communications, 2017, 15(S2): 47-51.
|
[10] |
Mohsin Raza, Sajjad Hussain, Hoa Le-Minh, Nauman Aslam.
Novel MAC Layer Proposal for URLLC in Industrial Wireless Sensor Networks
[J]. ZTE Communications, 2017, 15(S1): 50-59.
|
[11] |
XU Xiaoqiong, YU Hongfang, YANG Kun.
DDoS Attack in Software Defined Networks: A Survey
[J]. ZTE Communications, 2017, 15(3): 13-19.
|
[12] |
WU Chunming, LIU Qianjun, LI Yuwei, CHENG Qiumei, ZHOU Haifeng.
A Survey on Cloud Security
[J]. ZTE Communications, 2017, 15(2): 42-47.
|
[13] |
ZHOU Wanlei, MIN Geyong.
Recent Development on Security and Privacy in Modern Communication Environments
[J]. ZTE Communications, 2016, 14(S0): 1-1.
|
[14] |
LI Shancang, Imed Romdhani, William Buchanan.
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
[J]. ZTE Communications, 2016, 14(S0): 32-36.
|
[15] |
Zhi Liu, Xiang Wang, and Jun Li.
From CIA to PDR:A Top-Down Survey of SDN Security for Cloud DCN
[J]. ZTE Communications, 2016, 14(1): 54-60.
|