浏览/检索结果:共124条,第1-10条

已选(0)清除 条数/页:   排序方式:
On the computation of mixed strategies for security games with general defending requirements 期刊论文
Artificial Intelligence,2025, 卷号: 341
作者:  Bai,Rufan;  Lin,Haoxing;  Wu,Xiaowei;  Li,Minming;  Jia,Weijia
收藏  |  浏览/下载:32/0  |  提交时间:2025/08/20
Twisted industrial structure, land financing mode and social security 期刊论文
Finance Research Letters,2024, 卷号: 69
作者:  Li, Guoying;  Liu, Zhenhai;  Liu, Tangsen;  Chen, Li
收藏  |  浏览/下载:40/0  |  提交时间:2024/11/04
C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT 期刊论文
IEEE Transactions on Industrial Informatics,2023, 卷号: 19, 期号: 2, 页码: 1155-1164
作者:  Xu, Yang;  Bhuiyan, Md Zakirul Alam;  Wang, Tian;  Zhou, Xiaokang;  Singh, Amit Kumar
收藏  |  浏览/下载:35/0  |  提交时间:2023/04/18
State nationalism or popular nationalism? Analysing media coverage of TikTok ban on mainstream Indian TV news channels 期刊论文
Media Asia,2023, 卷号: 50, 期号: 4, 页码: 616-632
作者:  Kumar, Anilesh
收藏  |  浏览/下载:32/0  |  提交时间:2025/02/14
Xscope: Hunting for Cross-Chain Bridge Attacks 会议论文
ACM International Conference Proceeding Series, usa,Rochester, 2022-10-10——2022-10-10
作者:  Zhang,Jiashuo;  Gao,Jianbo;  Li,Yue;  Chen,Ziming;  Guan,Zhi
收藏  |  浏览/下载:16/0  |  提交时间:2025/08/05
An Architecture for Distributed Energies Trading in Byzantine-Based Blockchains 期刊论文
IEEE Transactions on Green Communications and Networking,2022, 卷号: 6, 期号: 2, 页码: 1216-1230
作者:  Guo, Jianxiong;  Ding, Xingjian;  Wu, Weili
收藏  |  浏览/下载:38/0  |  提交时间:2022/02/23
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs 期刊论文
IEEE Transactions on Network Science and Engineering,2022, 卷号: 9, 期号: 3, 页码: 1245-1263
作者:  Gu, Ke;  Dong, Xinying;  Li, Xiong;  Jia, Weijia
收藏  |  浏览/下载:35/0  |  提交时间:2022/02/23
Pricing and Budget Allocation for IoT Blockchain with Edge Computing 期刊论文
IEEE Transactions on Cloud Computing,2022
作者:  Ding, Xingjian;  Guo, Jianxiong;  Li, Deying;  Wu, Weili
收藏  |  浏览/下载:43/0  |  提交时间:2022/05/24
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs 期刊论文
IEEE Transactions on Cloud Computing,2022, 卷号: 10, 期号: 2, 页码: 1215 - 1232
作者:  Gu, Ke;  Dong, XinYing;  Jia, Weijia
收藏  |  浏览/下载:34/0  |  提交时间:2022/06/22
STMTO: A smart and trust multi-UAV task offloading system 期刊论文
Information Sciences,2021, 卷号: 573, 页码: 519-540
作者:  Guo, Jialin;  Huang, Guosheng;  Li, Qiang;  Xiong, Neal N.;  Zhang, Shaobo
收藏  |  浏览/下载:41/0  |  提交时间:2021/12/02