The following publications are possibly variants of this publication:
- End-to-end coding for TCPYong Cui, Lian Wang, Xin Wang, Yisen Wang, Fengyuan Ren, Shu-Tao Xia. network, 30(2):68-73, 2016. [doi]
- Malicious Code Detection under 5G HetNets Based on a Multi-Objective RBM ModelZhihua Cui, Yaru Zhao, Yang Cao, Xingjuan Cai, Wensheng Zhang, Jinjun Chen. network, 35(2):82-87, 2021. [doi]