×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Faculty of Science and Tec...
12
Graduate School
1
Faculty of Busines and Mana...
1
Research outside affiliate...
82
Authors
JIA Weijia
33
WANG Tian
30
LUO Zongwei
6
MENG TianHui
5
NG Adolf K. Y.
4
GUO Jianxiong
3
More...
Document Type
Journal article
70
Conference paper
22
Book
3
Review
3
Book chapter
2
Date Issued
2023
2
2022
4
2021
12
2020
11
2019
9
2018
9
More...
Language
英语English
89
中文Chinese
10
Indexed By
SCIE
46
CPCI-S
13
中文核心期刊要目总览
10
CSCD
9
EI
9
SSCI
4
More...
Funding Organization
Keyword
Security
26
security
14
Provable security
7
Fog computing
6
Cloud computing
5
Edge computing
5
More...
Source Publication
Lecture Notes in Computer S...
6
IEEE Internet of Things Jou...
3
Chinese Journal of Electron...
2
Computer Journal
2
IEEE Communications Letters
2
IEEE Transactions on Cloud ...
2
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 100
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Twisted industrial structure, land financing mode and social security
Journal article
Finance Research Letters,2024, volume: 69
Authors:
Li, Guoying
;
Liu, Zhenhai
;
Liu, Tangsen
;
Chen, Li
Favorite
  |  
View/Download:3/0
  |  
Submit date:2024/11/04
Industrial structure distortion
Land financing model
Social security
C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT
Journal article
IEEE Transactions on Industrial Informatics,2023, volume: 19, issue: 2, pages: 1155-1164
Authors:
Xu, Yang
;
Bhuiyan, Md Zakirul Alam
;
Wang, Tian
;
Zhou, Xiaokang
;
Singh, Amit Kumar
Favorite
  |  
View/Download:7/0
  |  
Submit date:2023/04/18
Cloud computing
context-aware data privacy
deep reinforcement learning (DRL)
edge computing (EC)
federated learning (FL)
Internet of Things (IoT)
security
State nationalism or popular nationalism? Analysing media coverage of TikTok ban on mainstream Indian TV news channels
Journal article
Media Asia,2023, volume: 50, issue: 4, pages: 616-632
Authors:
Kumar, Anilesh
Favorite
  |  
View/Download:2/0
  |  
Submit date:2025/02/14
China
discourse
India
journalism
nationalism
security
TikTok
An Architecture for Distributed Energies Trading in Byzantine-Based Blockchains
Journal article
IEEE Transactions on Green Communications and Networking,2022, volume: 6, issue: 2, pages: 1216-1230
Authors:
Guo, Jianxiong
;
Ding, Xingjian
;
Wu, Weili
Favorite
  |  
View/Download:17/0
  |  
Submit date:2022/02/23
Blockchains
Byzantine consensus
Cogeneration
Consortium blockchain
Distributed energies trading
Games
Resistance heating
Security
Smart cities
Smart city
Stackelberg game.
Throughput
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs
Journal article
IEEE Transactions on Network Science and Engineering,2022, volume: 9, issue: 3, pages: 1245-1263
Authors:
Gu, Ke
;
Dong, Xinying
;
Li, Xiong
;
Jia, Weijia
Favorite
  |  
View/Download:14/0
  |  
Submit date:2022/02/23
Cluster
Cryptography
False downstream data
Fog computing
Malicious node detection
Monitoring
Reliability
Routing
Security
Servers
Trajectory
VANET
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
Journal article
IEEE Transactions on Cloud Computing,2022, volume: 10, issue: 2, pages: 1215 - 1232
Authors:
Gu, Ke
;
Dong, XinYing
;
Jia, Weijia
Favorite
  |  
View/Download:9/0
  |  
Submit date:2022/06/22
Malicious node
fog computing
data security
reputation
VANETs
Pricing and Budget Allocation for IoT Blockchain with Edge Computing
Journal article
IEEE Transactions on Cloud Computing,2022
Authors:
Ding, Xingjian
;
Guo, Jianxiong
;
Li, Deying
;
Wu, Weili
Favorite
  |  
View/Download:15/0
  |  
Submit date:2022/05/24
Blockchain
Blockchains
Edge computing
Edge computing
Games
Internet of things
Internet of Things
Security
Servers
Stackelberg game
Task analysis
STMTO: A smart and trust multi-UAV task offloading system
Journal article
Information Sciences,2021, volume: 573, pages: 519-540
Authors:
Guo, Jialin
;
Huang, Guosheng
;
Li, Qiang
;
Xiong, Neal N.
;
Zhang, Shaobo
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Double auction model
Energy effective
Multi Unmanned Aerial Vehicles
Security
Task offloading
Trust
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems
Journal article
IEEE Transactions on Network Science and Engineering,2021, volume: 8, issue: 3, pages: 2087-2105
Authors:
Huang, Shaobo
;
Liu, Anfeng
;
Zhang, Shaobo
;
Wang, Tian
;
Xiong, Neal N.
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
baseline data based verifiable trust evaluation
data collection
mobile vehicles
security
Smart network systems
unmanned aerial vehicles.
Edge-based auditing method for data security in resource-constrained Internet of Things
Journal article
Journal of Systems Architecture,2021, volume: 114
Authors:
Wang, Tian
;
Mei, Yaxin
;
Liu, Xuxun
;
Wang, Jin
;
Dai, Hong Ning
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Audit model
Binary tree
Data security
Edge computing
Resource-constrained terminal