×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
5
作者
王田
4
贾维嘉
1
郭剑雄
1
孟天晖
1
文献类型
期刊论文
6
会议论文
1
发表日期
2025
2
2024
1
2020
2
2019
1
2018
1
语种
英语English
7
收录类别
SCIE
5
资助机构
关键词
Bayesian game
1
Boundary users
1
DDoS attacks
1
Data virus
1
Edge collaboration
1
Fix-on-deployment
1
更多...
出处
ACM Transactions on Sensor ...
1
IEEE Access
1
Information Sciences
1
International Journal of Di...
1
Journal of Parallel and Dis...
1
Journal of Systems Architec...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共7条,第1-7条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
On container vulnerabilities in edge computing: A fix-on-deployment approach
期刊论文
Journal of Systems Architecture,2025, 卷号: 168
作者:
Huang,Haiyang
;
Meng,Tianhui
;
Guo,Jianxiong
;
Tang,Zhiqing
;
Jia,Weijia
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2025/08/20
Edge collaboration
Fix-on-deployment
Package-sharing
Vulnerability
Joint Optimization of Prompt Security and System Performance in Edge-Cloud LLM Systems
会议论文
Proceedings - IEEE INFOCOM, London, 2025-05-19——2025-05-22
作者:
Huang,Haiyang
;
Meng,Tianhui
;
Jia,Weijia
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2025/08/20
Bayesian game
edge-cloud
LLM
Prompt attack
resource optimization
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing
期刊论文
ACM Transactions on Sensor Networks,2024, 卷号: 20, 期号: 3
作者:
Huang, Haiyang
;
Meng, Tianhui
;
Guo, Jianxiong
;
Wei, Xuekai
;
Jia, Weijia
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2024/06/13
container
DDoS attacks
Mobile edge computing
queue networks
scheduling
An online and real-time adaptive operational modal parameter identification method based on fog computing in Internet of Things
期刊论文
International Journal of Distributed Sensor Networks,2020, 卷号: 16, 期号: 2
作者:
Wang, Cheng
;
Huang, Haiyang
;
Chen, Jianwei
;
Wei, Wei
;
Wang, Tian
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2021/12/02
adaptive operational modal analysis
eigenvector recursive principal component analysis
Fog computing
Internet of Things
limited memory
non-stationary random response
online and real time
slow linear time-varying
An incentive-based protection and recovery strategy for secure big data in social networks
期刊论文
Information Sciences,2020, 卷号: 508, 页码: 79-91
作者:
Wu, Youke
;
Huang, Haiyang
;
Wu, Ningyun
;
Wang, Yue
;
Alam Bhuiyan, Md Zakirul
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/12/02
Data virus
Incentive mechanism
Information propagation
Privacy
Protection and recovery strategy
Secure big data
A risk defense method based on microscopic state prediction with partial information observations in social networks
期刊论文
Journal of Parallel and Distributed Computing,2019, 卷号: 131, 页码: 189-199
作者:
Wu, You Ke
;
Huang, Haiyang
;
Wu, Qun
;
Liu, Anfeng
;
Wang, Tian
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2021/12/02
Boundary users
Risk defense
Security and privacy
Sensor observation
social network threats
Using mobile nodes to control rumors in big data based on a new rumor propagation model in vehicular social networks
期刊论文
IEEE Access,2018, 卷号: 6, 页码: 62612-62621
作者:
Wu, Youke
;
Huang, Haiyang
;
Zhao, Junjie
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2021/12/02
rumor propagation model
time delay
vehicular node
Vehicular social networks