×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
理工科技学院
2
个人在本单位外知识产出
19
作者
王田
9
贾维嘉
6
陈钟
4
骆宗伟
1
文献类型
期刊论文
13
会议论文
4
专著
2
评论文章
2
发表日期
2023
1
2021
1
2020
3
2019
5
2018
2
2017
3
更多...
语种
英语English
18
中文Chinese
3
收录类别
SCIE
9
CPCI-S
2
CSCD
2
EI
2
中文核心期刊要目总览
2
资助机构
关键词
Security
6
Privacy
5
Security and privacy
4
Cloud computing
3
Internet of Things (IoT)
3
security
3
更多...
出处
IEEE Transactions on Indust...
2
Jisuanji Yanjiu yu Fazhan/C...
2
IEEE Internet of Things Jou...
1
IEEE Transactions on Emergi...
1
IEEE Transactions on Green ...
1
Information Fusion
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共21条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT
期刊论文
IEEE Transactions on Industrial Informatics,2023, 卷号: 19, 期号: 2, 页码: 1155-1164
作者:
Xu, Yang
;
Bhuiyan, Md Zakirul Alam
;
Wang, Tian
;
Zhou, Xiaokang
;
Singh, Amit Kumar
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2023/04/18
Cloud computing
context-aware data privacy
deep reinforcement learning (DRL)
edge computing (EC)
federated learning (FL)
Internet of Things (IoT)
security
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System
期刊论文
IEEE Transactions on Green Communications and Networking,2021, 卷号: 6, 期号: 1, 页码: 313 - 328
作者:
Xia, ,Zhuoqun
;
Zhang, Yichao
;
Gu, Ke
;
Li, Xiong
;
Jia, Wei Jia
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/02/23
Companies
Data aggregation
Data aggregation
Data privacy
Fog computing
Meters
Privacy protection.
Security
Smart grids
Smart meter
Smart meters
DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring
期刊论文
Information Fusion,2020, 卷号: 62, 页码: 32-46
作者:
Hai, Tao
;
Bhuiyan, Md Zakirul Alam
;
Wang, Jing
;
Wang, Tian
;
Hsu, D. Frank
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/02
Body sensor networks
Data dependability
Data quality
Decision-making
Dependability
Healthcare monitoring
Security and privacy
TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System
期刊论文
IEEE Transactions on Industrial Informatics,2020, 卷号: 16, 期号: 5, 页码: 3311-3321
作者:
Tao, Hai
;
Bhuiyan, Md Zakirul Alam
;
Rahman, Md Arafatur
;
Wang, Tian
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2021/12/02
Data collection
data trustworthiness
fault tolerance
industrial cyber-physical environments
industrial event monitoring
privacy
security
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things
期刊论文
IEEE Internet of Things Journal,2020, 卷号: 7, 期号: 4, 页码: 2679-2689
作者:
Wang, Tian
;
Bhuiyan, Md Zakirul Alam
;
Wang, Guojun
;
Qi, Lianyong
;
Wu, Jie
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2021/12/02
Biometric
data collection
data integrity
ECC
Internet of Things (IoT)
privacy
security
truth discovery
Survey on Sensor-Cloud Based on Edge Computing 基于边缘计算的传感云研究进展
评论文章
2019
作者:
Cao,Zhi Han
;
Lu,Yu Cheng
;
Lai,Si Si
;
Yu,Zhi Yong
;
Ma,Ying
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2021/12/02
Cloud computing
Edge computing
Privacy security
Sensor-cloud
WSNs
A survey on security attacks in VANETs: Communication, applications and challenges
评论文章
2019
作者:
Arif, Muhammad
;
Wang, Guojun
;
Bhuiyan, Md Zakirul Alam
;
Wang, Tian
;
Chen, Jianer
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/12/02
Ad-hoc network
Applications
Challenges
Privacy
Security
Vehicles
A risk defense method based on microscopic state prediction with partial information observations in social networks
期刊论文
Journal of Parallel and Distributed Computing,2019, 卷号: 131, 页码: 189-199
作者:
Wu, You Ke
;
Huang, Haiyang
;
Wu, Qun
;
Liu, Anfeng
;
Wang, Tian
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2021/12/02
Boundary users
Risk defense
Security and privacy
Sensor observation
social network threats
Secure Data Sequence Query Framework Based on Multiple Fogs
期刊论文
IEEE Transactions on Emerging Topics in Computing,2019, 卷号: 9, 期号: 4, 页码: 1883-1900
作者:
Gu, Ke
;
Wu, Na
;
Yin, Bo
;
Jia, Weijia
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/05/10
Cloud computing
Data sequence query
Edge computing
Fog computing
Merkle hashing tree
Network topology
Privacy
Security
Security
Servers
Topology
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid
会议论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
作者:
Bhuiyan, Md Zakirul Alam
;
Zaman, Mdaliuz
;
Wang, Guojun
;
Wang, Tian
;
Rahman, Md Arafat
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2021/12/02
Compromised information injection
Demand response
Internet of Things (IoT)
Privacy
Security attack
Smart grid