[1] |
YANG Peng,JING Shangqi,YAN Junjie,YANG Zhigang.
Defending Bad Mouthing Attack Data Forwarding Mechanism for
Intermittently Connected Wireless Networks
[J]. Journal of Shanghai Jiaotong University, 2018, 52(7): 808-815.
|
[2] |
ZHANG Ying,QIAO Yunlong*,ZHANG Haiyang.
Coverage Enhancing for Underwater Acoustic Sensor Networks Based on
Virtual Force and Fruit Fly Optimization Algorithm
[J]. Journal of Shanghai Jiaotong University, 2017, 51(6): 715-721.
|
[3] |
YANG Bin,LU Yuliang,YANG Guozheng,ZHU Kailong.
An Artificial Immune Network Classification Algorithm Based on VirtualForce Direction and Cell Differentiation
[J]. Journal of Shanghai Jiaotong University, 2017, 51(1): 98-.
|
[4] |
WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1.
Network Security Situation Awareness Method Based on Multi-Source and Multi-Level Information Fusion
[J]. Journal of Shanghai Jiaotong University, 2015, 49(08): 1144-1152.
|
[5] |
XU Bo,MIN Huaqing,XIAO Fangxiong.
Ant Colony Algorithm for Solving Discrete Minimum Constraint Removal (MCR) Problem
[J]. Journal of Shanghai Jiaotong University, 2015, 49(03): 383-386.
|
[6] |
WANG Xin1,JIA Qingxuan1,GAO Xin1,CHEN Gang1,ZHAO Bing2.
Adaptive N Tree Anti-Collision Algorithm Based on Bitmap Construction
[J]. Journal of Shanghai Jiaotong University, 2015, 49(02): 150-157.
|
[7] |
ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1.
A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers
[J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 899-906.
|
[8] |
ZHANG Ying,JI Changgang,LI Junfu.
A Routing Algorithm Based on Energy and Distance for Heterogeneous Sensor Networks with Multilevel Energies
[J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 953-958.
|
[9] |
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1.
Identity-based Threshold Key-insulated Signature Without Random Oracles
[J]. Journal of Shanghai Jiaotong University, 2013, 47(08): 1239-1245.
|
[10] |
XIE Jing, LIU Gong-Shen, SU Bo, MENG Kui.
Prediction of User’s Retweet Behavior in Social Network
[J]. Journal of Shanghai Jiaotong University, 2013, 47(04): 583-588.
|
[11] |
LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2.
A Binary-String-Set-Based Algebraic Framework for Policy Composition
[J]. Journal of Shanghai Jiaotong University, 2013, 47(04): 579-583.
|
[12] |
QIAO Yu-Ran, WU Nan, YANG Qian-Ming, WEN Mei, ZHANG Chun-Yuan.
Deadlock Detection and Recovery Based on Topological Order for NoC
[J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 92-97.
|
[13] |
CHEN Gui-Rong-1, 2 , CAI Wan-Dong-1, XU Hui-Jie-1, YAN Pei-Xiang-3, WANG Jian-Ping-1.
High-Effect Priority Bounded Confidence Model for Network Opinion Evolution
[J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 155-160.
|
[14] |
FANG Ming-1, CHEN Song-Qiao-1, WANG Ke-Fei-2.
High Radix Router Design Based on Asymmetric Crossbar
[J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 138-143.
|
[15] |
ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge.
Single Transceiver and Network Characteristics Based
MAC Protocol for Cognitive Radio Wireless Sensor Networks
[J]. Journal of Shanghai Jiaotong University, 2012, 46(11): 1729-1735.
|