-
Encrypted speech authentication and recovery scheme based on fragile watermarking
Author: Zhang, Qiu-yu; Xu, Fu-jiu
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 1, pp. 125-140. DOI: 10.1007/s11235-022-00976-1
-
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing
Author: Shi, Zhaosen; Yang, Zeyu; Hassan, Alzubair; Li, Fagen; Ding, Xuyang
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 3, pp. 419-433. DOI: 10.1007/s11235-022-00982-3
-
On the predictability in reversible steganography
Author: Chang, Ching-Chun; Wang, Xu; Chen, Sisheng; Kiya, Hitoshi; Echizen, Isao
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 2, pp. 301-313. DOI: 10.1007/s11235-022-00985-0
-
Throughput optimization for backscatter-and-NOMA-enabled wireless powered cognitive radio network
Author: Chen, Yuzhe; Li, Yanjun; Gao, Meihui; Tian, Xianzhong; Chi, Kaikai
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. , Issue , pp. -. DOI: 10.1007/s11235-023-01012-6
-
An improved DV-Hop algorithm based on PSO and Modified DE algorithm
Author: Sun, Haibin; Wang, Dong; Li, Hongxing; Meng, Ziran
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 3, pp. 403-418. DOI: 10.1007/s11235-023-00991-w
-
Android malware detection based on sensitive patterns
Author: Liu, Kang; Zhang, Guanghui; Chen, Xue; Liu, Qing; Peng, Linyu; Yurui, Liu
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 4, pp. 435-449. DOI: 10.1007/s11235-022-00983-2
-
Joint trajectory and power design for UAV-enabled cooperative jamming in two-way secure communication
Author: Zhang, Yiwen; Cheng, Ruixia
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 4, pp. 487-498. DOI: 10.1007/s11235-023-00994-7
-
Puncturing scheme for polar codes based on channel reliability estimation
Author: Han, Tianwei; Fu, Meiyu; Zhang, Meiling; Hu, Guijun
Journal: TELECOMMUNICATION SYSTEMS. 2023; Vol. 82, Issue 4, pp. 499-508. DOI: 10.1007/s11235-023-00996-5