×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Faculty of Science and Tech...
4
Research outside affiliate...
16
Authors
WANG Tian
10
JIA Weijia
8
LUO Zongwei
2
Document Type
Journal article
16
Book
2
Conference paper
2
Date Issued
2023
1
2022
2
2021
3
2020
6
2019
1
2018
1
More...
Language
英语English
19
中文Chinese
1
Indexed By
SCIE
13
CPCI-S
2
CSCD
1
EI
1
中文核心期刊要目总览
1
Funding Organization
Keyword
Security
5
security
5
Fog computing
4
cloud computing
3
Cloud computing
2
Data collection
2
More...
Source Publication
IEEE Transactions on Indust...
2
IEEE Transactions on Networ...
2
2020 International Wireless...
1
Computer Communications
1
IEEE Internet of Things Jou...
1
IEEE Transactions on Cloud ...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 20
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT
Journal article
IEEE Transactions on Industrial Informatics,2023, volume: 19, issue: 2, pages: 1155-1164
Authors:
Xu, Yang
;
Bhuiyan, Md Zakirul Alam
;
Wang, Tian
;
Zhou, Xiaokang
;
Singh, Amit Kumar
Favorite
  |  
View/Download:7/0
  |  
Submit date:2023/04/18
Cloud computing
context-aware data privacy
deep reinforcement learning (DRL)
edge computing (EC)
federated learning (FL)
Internet of Things (IoT)
security
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs
Journal article
IEEE Transactions on Network Science and Engineering,2022, volume: 9, issue: 3, pages: 1245-1263
Authors:
Gu, Ke
;
Dong, Xinying
;
Li, Xiong
;
Jia, Weijia
Favorite
  |  
View/Download:14/0
  |  
Submit date:2022/02/23
Cluster
Cryptography
False downstream data
Fog computing
Malicious node detection
Monitoring
Reliability
Routing
Security
Servers
Trajectory
VANET
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
Journal article
IEEE Transactions on Cloud Computing,2022, volume: 10, issue: 2, pages: 1215 - 1232
Authors:
Gu, Ke
;
Dong, XinYing
;
Jia, Weijia
Favorite
  |  
View/Download:9/0
  |  
Submit date:2022/06/22
Malicious node
fog computing
data security
reputation
VANETs
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems
Journal article
IEEE Transactions on Network Science and Engineering,2021, volume: 8, issue: 3, pages: 2087-2105
Authors:
Huang, Shaobo
;
Liu, Anfeng
;
Zhang, Shaobo
;
Wang, Tian
;
Xiong, Neal N.
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
baseline data based verifiable trust evaluation
data collection
mobile vehicles
security
Smart network systems
unmanned aerial vehicles.
Edge-based auditing method for data security in resource-constrained Internet of Things
Journal article
Journal of Systems Architecture,2021, volume: 114
Authors:
Wang, Tian
;
Mei, Yaxin
;
Liu, Xuxun
;
Wang, Jin
;
Dai, Hong Ning
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Audit model
Binary tree
Data security
Edge computing
Resource-constrained terminal
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System
Journal article
IEEE Transactions on Green Communications and Networking,2021, volume: 6, issue: 1, pages: 313 - 328
Authors:
Xia, ,Zhuoqun
;
Zhang, Yichao
;
Gu, Ke
;
Li, Xiong
;
Jia, Wei Jia
Favorite
  |  
View/Download:10/0
  |  
Submit date:2022/02/23
Companies
Data aggregation
Data aggregation
Data privacy
Fog computing
Meters
Privacy protection.
Security
Smart grids
Smart meter
Smart meters
A trust-based minimum cost and quality aware data collection scheme in P2P network
Journal article
Peer-to-Peer Networking and Applications,2020, volume: 13, issue: 6, pages: 2300-2323
Authors:
Ren, Yingying
;
Zeng, Zhiwen
;
Wang, Tian
;
Zhang, Shaobo
;
Zhi, Guoming
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/12/02
Data collection
Machine learning
Minimum cost
P2P network
Security
Trust
DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring
Journal article
Information Fusion,2020, volume: 62, pages: 32-46
Authors:
Hai, Tao
;
Bhuiyan, Md Zakirul Alam
;
Wang, Jing
;
Wang, Tian
;
Hsu, D. Frank
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/12/02
Body sensor networks
Data dependability
Data quality
Decision-making
Dependability
Healthcare monitoring
Security and privacy
An IoT-oriented Cloud Platform for Intelligent Management of Emergency Equipment
Conference paper
2020 International Wireless Communications and Mobile Computing, IWCMC 2020, Limassol, CYPRUS, JUN 15-19, 2020
Authors:
Ma, Bo
;
Wang, Tian
;
Lin, Liming
;
Lv, Xirong
;
Ma, Ying
Favorite
  |  
View/Download:7/0
  |  
Submit date:2021/12/02
Big data
City security
Cloud platform
Emergency equipment
Intelligent management
Internet of things
TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System
Journal article
IEEE Transactions on Industrial Informatics,2020, volume: 16, issue: 5, pages: 3311-3321
Authors:
Tao, Hai
;
Bhuiyan, Md Zakirul Alam
;
Rahman, Md Arafatur
;
Wang, Tian
;
Wu, Jie
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Data collection
data trustworthiness
fault tolerance
industrial cyber-physical environments
industrial event monitoring
privacy
security