[1] |
HU Jiaxi.
Assist beam management and 5G network capacity optimization based on deep learning
[J]. Information and Communications Technology and Policy, 2020, 46(9): 91-96.
|
[2] |
XIAO Yang, WU Jiawei, LI Jianxue, LIU Jun.
A dynamic routing algorithm based on deep reinforcement learning
[J]. Information and Communications Technology and Policy, 2020, 46(9): 48-54.
|
[3] |
TAN Qingling, XIE Lijing.
Analysis of the data security risk of Internet of Vehicles and the solutions
[J]. Information and Communications Technology and Policy, 2020, 46(8): 37-40.
|
[4] |
YANG Chunbaixue, CHEN Tian.
Epidemic response and data protection in Europe and America
[J]. Information and Communications Technology and Policy, 2020, 46(8): 63-67.
|
[5] |
WANG Yanyan, GUI Li, CAI Yafen.
Research on the evaluation of user data protection of IoV
[J]. Information and Communications Technology and Policy, 2020, 46(8): 68-71.
|
[6] |
WANG Chen, SONG Liang.
Research on data security protection system of Industrial Internet
[J]. Information and Communications Technology and Policy, 2020, 46(4): 7-11.
|
[7] |
WANG Zhuo, LIU Guowei, WANG Yan, LI Yuan.
Research on the development and trend of data masking technology
[J]. Information and Communications Technology and Policy, 2020, 46(4): 18-22.
|
[8] |
ZHANG Yuanjing, WANG Yao, XIE Jun, BI Ran.
Analysis on security of 5G network and suggestions for security scheme
[J]. Information and Communications Technology and Policy, 2020, 46(4): 47-53.
|
[9] |
ZHOU Jun, WANG Xianqiang.
Research of government data security in the construction of new-type smart city
[J]. Information and Communications Technology and Policy, 2020, 46(3): 29-33.
|
[10] |
WEI Liang, ZHA Xuan.
Risk analysis and evaluation of Blockchain infrastructure
[J]. Information and Communications Technology and Policy, 2020, 46(2): 10-13.
|
[11] |
FENG Zebing, LU Yue.
Analysis on Blockchain technology enhancing the security of UAV swarm system
[J]. Information and Communications Technology and Policy, 2020, 46(2): 14-18.
|
[12] |
YANG Hongmei, XIE Jun.
Application and security analysis of 5G Network slice
[J]. Information and Communications Technology and Policy, 2020, 46(2): 25-29.
|
[13] |
LI Qi, LIU Danni.
Research and architecture design of the security protection of Internet of Things based on NB-IoT Network
[J]. Information and Communications Technology and Policy, 2020, 46(2): 30-34.
|
[14] |
ZHANG Jian, TANG Hongyu, LIU Wentao.
Security vulnerability analysis and protection research of virtualization platform
[J]. Information and Communications Technology and Policy, 2020, 46(2): 41-45.
|
[15] |
ZHANG Yan, HE Shen, SU Li.
A traceable and lightweight protection method for user information against leakage
[J]. Information and Communications Technology and Policy, 2020, 46(2): 46-49.
|