×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Research outside affiliated...
5
Authors
WANG Tian
4
JIA Weijia
1
GUO Jianxiong
1
MENG TianHui
1
Document Type
Journal article
5
Date Issued
2024
1
2020
2
2019
1
2018
1
Language
英语English
5
Indexed By
SCIE
5
Funding Organization
Keyword
Boundary users
1
DDoS attacks
1
Data virus
1
Fog computing
1
Incentive mechanism
1
Information propagation
1
More...
Source Publication
ACM Transactions on Sensor ...
1
IEEE Access
1
Information Sciences
1
International Journal of Di...
1
Journal of Parallel and Dis...
1
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-5 of 5
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing
Journal article
ACM Transactions on Sensor Networks,2024, volume: 20, issue: 3
Authors:
Favorite
  |  
View/Download:5/0
  |  
Submit date:2024/06/13
container
DDoS attacks
Mobile edge computing
queue networks
scheduling
An online and real-time adaptive operational modal parameter identification method based on fog computing in Internet of Things
Journal article
International Journal of Distributed Sensor Networks,2020, volume: 16, issue: 2
Authors:
Wang, Cheng
;
Huang, Haiyang
;
Chen, Jianwei
;
Wei, Wei
;
Wang, Tian
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/12/02
adaptive operational modal analysis
eigenvector recursive principal component analysis
Fog computing
Internet of Things
limited memory
non-stationary random response
online and real time
slow linear time-varying
An incentive-based protection and recovery strategy for secure big data in social networks
Journal article
Information Sciences,2020, volume: 508, pages: 79-91
Authors:
Wu, Youke
;
Huang, Haiyang
;
Wu, Ningyun
;
Wang, Yue
;
Alam Bhuiyan, Md Zakirul
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/12/02
Data virus
Incentive mechanism
Information propagation
Privacy
Protection and recovery strategy
Secure big data
A risk defense method based on microscopic state prediction with partial information observations in social networks
Journal article
Journal of Parallel and Distributed Computing,2019, volume: 131, pages: 189-199
Authors:
Wu, You Ke
;
Huang, Haiyang
;
Wu, Qun
;
Liu, Anfeng
;
Wang, Tian
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/12/02
Boundary users
Risk defense
Security and privacy
Sensor observation
social network threats
Using mobile nodes to control rumors in big data based on a new rumor propagation model in vehicular social networks
Journal article
IEEE Access,2018, volume: 6, pages: 62612-62621
Authors:
Wu, Youke
;
Huang, Haiyang
;
Zhao, Junjie
;
Wang, Cheng
;
Wang, Tian
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/12/02
rumor propagation model
time delay
vehicular node
Vehicular social networks