×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Graduate School
1
Research outside affiliate...
10
Authors
MENG TianHui
5
JIA Weijia
3
WANG Tian
2
EZE Uchenna Cyril
1
Document Type
Conference paper
5
Journal article
4
Book
2
Date Issued
2021
2
2018
1
2017
4
2016
1
2015
2
2008
1
More...
Language
英语English
11
Indexed By
SCIE
4
CPCI-S
3
CPCI-SSH
1
Funding Organization
Keyword
Security attributes
3
Mobile offloading
2
Quantitative analysis
2
Security
2
big data
2
cloud computing
2
More...
Source Publication
Lecture Notes in Computer S...
3
2017 International Conferen...
1
Ad-Hoc and Sensor Wireless ...
1
IEEE Transactions on Mobile...
1
IEEE Transactions on Networ...
1
Innovation and Knowledge Ma...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 11
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems
Journal article
IEEE Transactions on Network Science and Engineering,2021, volume: 8, issue: 3, pages: 2087-2105
Authors:
Huang, Shaobo
;
Liu, Anfeng
;
Zhang, Shaobo
;
Wang, Tian
;
Xiong, Neal N.
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
baseline data based verifiable trust evaluation
data collection
mobile vehicles
security
Smart network systems
unmanned aerial vehicles.
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning
Journal article
IEEE Transactions on Mobile Computing,2021, volume: 22, issue: 1, pages: 237-252
Authors:
Qian, Liping
;
Wu, Yuan
;
Yu, Ningning
;
Wang, Daohang
;
Jiang, Fuli
Favorite
  |  
View/Download:14/0
  |  
Submit date:2021/05/10
and Joint Computation and Communication Resource Allocations
Communication system security
Energy consumption
Multi-Access Mobile Edge Computing
Optimization
Resource management
Secrecydriven Computation Offloading
Servers
Task analysis
Wireless communication
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks
Journal article
Pervasive and Mobile Computing,2018, volume: 45, pages: 4-18
Authors:
Meng, Tianhui
;
Wolter, Katinka
;
Wu, Huaming
;
Wang, Qiushi
Favorite
  |  
View/Download:3/0
  |  
Submit date:2025/02/20
Computation offloading
Mobile Cloud Computing
Security
Side-channel attack
An empirical performance and security evaluation of android container solutions
Conference paper
2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, 19 June 2017-20 June 2017
Authors:
Meng, Tianhui
;
Shang, Zhihao
;
Wolter, Katinka
Favorite
  |  
View/Download:3/0
  |  
Submit date:2025/02/20
Android container solution
Application Security
BYOD
Mobile Security
Timing attacks
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II
Book
United States:Springer, 2017
Authors:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I
Book
United States:Springer, 2017
Authors:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
The chaotic video surveillance in mobile camera sensor networks: Improving the efficiency and security
Journal article
Ad-Hoc and Sensor Wireless Networks,2017, volume: 37, issue: 1-4, pages: 95-115
Authors:
Wang, Tian
;
Wang, Wenhua
;
Lai, Yongxuan
;
Wen, Sheng
;
Tian, Hui
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Chaotic path planning algorithm
Mobile camera sensors
Randomness
Surveillance security
The stadia ant colony algorithm
Video surveillance
Analysis of mitigation measures for timing attacks in mobile-cloud offloading systems
Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Munster, 4 April 2016- 6 April 2016
Authors:
Meng, Tianhui
;
Wolter, Katinka
Favorite
  |  
View/Download:2/0
  |  
Submit date:2025/02/20
Mobile cloud offloading
Random delays
Security attributes
Timing side-channels
Model-based quantitative security analysis of mobile offloading systems under timing attacks
Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Albena, BULGARIA, MAY 26-29, 2015
Authors:
Meng, Tianhui
;
Wang, Qiushi
;
Wolter, Katinka
Favorite
  |  
View/Download:4/0
  |  
Submit date:2025/02/20
Mobile offloading
Quantitative analysis
Security attributes
Semi-Markov process
Security and performance tradeoff analysis of mobile offloading systems under timing attacks
Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Madrid, SPAIN, AUG 31-SEP 01, 2015
Authors:
Meng, Tianhui
;
Wolter, Katinka
;
Wang, Qiushi
Favorite
  |  
View/Download:3/0
  |  
Submit date:2025/02/20
Mobile offloading
Phase-type distribution
Quantitative analysis
Security attributes