×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Research outside affiliate...
14
Authors
JIA Weijia
14
WANG Tian
2
Document Type
Journal article
8
Conference paper
6
Review
1
Date Issued
2022
1
2017
3
2013
3
2012
1
2011
1
2009
3
More...
Language
英语English
11
中文Chinese
4
Indexed By
CPCI-S
5
SCIE
5
中文核心期刊要目总览
2
CSCD
1
Funding Organization
Keyword
Anonymity
4
Tor
3
Anonymizer
2
Mix networks
2
TCP dynamics
2
WiMAX
2
More...
Source Publication
小型微型计算机系统/Journal of Chines...
2
2008 International Conferen...
1
2011 Proceedings IEEE INFOC...
1
Computer Networks
1
IEEE Transactions on Comput...
1
IEEE/ACM Transactions on Ne...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 15
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
基于驱动与控制相互作用的成瘾冲动性结构与机制
Journal article
心理科学进展,2022, volume: 30, issue: 05, pages: 1028-1037
Authors:
曾红
;
安静雯
;
黄海娇
;
甄葭
;
杨珍芝
Favorite
  |  
View/Download:3/0
  |  
Submit date:2024/02/22
成瘾行为
冲动性
驱动力
抑制力
Research Advance of Detection-Centric Target Tracking with Mobile Elements in Wireless Sensor Networks
Review
2017
Authors:
Wang, Tian
;
Liang, Yuzhu
;
Peng, Zhen
;
Peng, Shaoliang
;
Cai, Shaobin
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/08/31
Reliable wireless connections for fast-moving rail users based on a chained fog structure
Journal article
Information Sciences,2017, volume: 379, pages: 160-176
Authors:
Wang, Tian
;
Peng, Zhen
;
Wen, Sheng
;
Lai, Yongxuan
;
Jia, Weijia
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/05/10
Cascade shifting flow problem
Fast-moving rail
Fog structure
Reliability
异构无线传感器网络中移动式目标跟踪研究进展
Journal article
小型微型计算机系统/Journal of Chinese Computer Systems,2017, volume: 38, issue: 2, pages: 193-199
Authors:
彭臻
;
王田
;
梁俊斌
;
赖永炫
;
王国军
Favorite
  |  
View/Download:0/0
  |  
Submit date:2021/09/16
异构无线传感器网络
移动节点
目标跟踪
目标探测
研究进展
heterogeneouswireless sensor networks
mobile elements
target tracking
target detection
research advance
Blind detection of spread spectrum flow watermarks
Journal article
Security and Communication Networks,2013, volume: 6, issue: 3, pages: 257-274
Authors:
Jia, Weijia
;
Tso, Fung Po
;
Ling, Zhen
;
Fu, Xinwen
;
Xuan, Dong
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
Anonymity
Detection
DSSS
Mean-square autocorrelation
Protocol-level attacks against Tor
Journal article
Computer Networks,2013, volume: 57, issue: 4, pages: 869-886
Authors:
Ling, Zhen
;
Luo, Junzhou
;
Yu, Wei
;
Fu, Xinwen
;
Jia, Weijia
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
Anonymity
Mix networks
Protocol-level attacks
Tor
Novel packet size-based covert channel attacks against anonymizer
Journal article
IEEE Transactions on Computers,2013, volume: 62, issue: 12, pages: 2411-2426
Authors:
Ling, Zhen
;
Fu, Xinwen
;
Jia, Weijia
;
Yu, Wei
;
Xuan, Dong
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
Anonymizer
TCP dynamics
Watermark
A new cell-counting-based attack against tor
Journal article
IEEE/ACM Transactions on Networking,2012, volume: 20, issue: 4, pages: 1245-1261
Authors:
Ling, Zhen
;
Luo, Junzhou
;
Yu, Wei
;
Fu, Xinwen
;
Xuan, Dong
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
Anonymity
cell counting
mix networks
signal
Tor
A novel packet size based covert channel attack against anonymizer
Conference paper
2011 Proceedings IEEE INFOCOM, Shanghai, China, 10-15 April 2011
Authors:
Ling, Zhen
;
Fu, Xinwen
;
Jia, Weijia
;
Yu, Wei
;
Xuan, Dong
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/07/30
Anonymizer
Covert Channel
TCP dynamics
One cell is enough to break tor's anonymity
Conference paper
Proceedings of Black Hat Technical Security Conference, USA, JULY 25-30, 2009
Authors:
Fu, Xinwen
;
Ling, Zhen
;
Luo, Junzhou
;
Yu, Wei
;
Jia, Weijia
Favorite
  |  
View/Download:1/0
  |  
Submit date:2022/06/17