×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
理工科技学院
12
研究生院
1
工商管理学院
1
个人在本单位外知识产出
106
作者
贾维嘉
33
王田
30
陈钟
20
骆宗伟
6
孟天晖
5
吴盖宇
4
更多...
文献类型
期刊论文
90
会议论文
26
专著
3
评论文章
3
著作章节
2
发表日期
2023
2
2022
5
2021
12
2020
11
2019
9
2018
10
更多...
语种
英语English
113
中文Chinese
10
收录类别
SCIE
52
CPCI-S
15
中文核心期刊要目总览
10
CSCD
9
EI
9
SSCI
4
更多...
资助机构
关键词
Security
31
security
15
Provable security
9
Fog computing
6
Cloud computing
5
Edge computing
5
更多...
出处
Jisuanji Yanjiu yu Fazhan/C...
6
Lecture Notes in Computer S...
6
IEEE Internet of Things Jou...
3
Information Sciences
3
ACM International Conferenc...
2
Beijing Daxue Xuebao (Ziran...
2
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共124条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
On the computation of mixed strategies for security games with general defending requirements
期刊论文
Artificial Intelligence,2025, 卷号: 341
作者:
Bai,Rufan
;
Lin,Haoxing
;
Wu,Xiaowei
;
Li,Minming
;
Jia,Weijia
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2025/08/20
Compact representation
Efficient algorithm
Mixed strategy
Resource allocation
Security games
Twisted industrial structure, land financing mode and social security
期刊论文
Finance Research Letters,2024, 卷号: 69
作者:
Li, Guoying
;
Liu, Zhenhai
;
Liu, Tangsen
;
Chen, Li
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2024/11/04
Industrial structure distortion
Land financing model
Social security
C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT
期刊论文
IEEE Transactions on Industrial Informatics,2023, 卷号: 19, 期号: 2, 页码: 1155-1164
作者:
Xu, Yang
;
Bhuiyan, Md Zakirul Alam
;
Wang, Tian
;
Zhou, Xiaokang
;
Singh, Amit Kumar
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2023/04/18
Cloud computing
context-aware data privacy
deep reinforcement learning (DRL)
edge computing (EC)
federated learning (FL)
Internet of Things (IoT)
security
State nationalism or popular nationalism? Analysing media coverage of TikTok ban on mainstream Indian TV news channels
期刊论文
Media Asia,2023, 卷号: 50, 期号: 4, 页码: 616-632
作者:
Kumar, Anilesh
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2025/02/14
China
discourse
India
journalism
nationalism
security
TikTok
Xscope: Hunting for Cross-Chain Bridge Attacks
会议论文
ACM International Conference Proceeding Series, usa,Rochester, 2022-10-10——2022-10-10
作者:
Zhang,Jiashuo
;
Gao,Jianbo
;
Li,Yue
;
Chen,Ziming
;
Guan,Zhi
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2025/08/05
Blockchain
Cross-Chain Bridge
Security Analysis
An Architecture for Distributed Energies Trading in Byzantine-Based Blockchains
期刊论文
IEEE Transactions on Green Communications and Networking,2022, 卷号: 6, 期号: 2, 页码: 1216-1230
作者:
Guo, Jianxiong
;
Ding, Xingjian
;
Wu, Weili
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2022/02/23
Blockchains
Byzantine consensus
Cogeneration
Consortium blockchain
Distributed energies trading
Games
Resistance heating
Security
Smart cities
Smart city
Stackelberg game.
Throughput
Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs
期刊论文
IEEE Transactions on Network Science and Engineering,2022, 卷号: 9, 期号: 3, 页码: 1245-1263
作者:
Gu, Ke
;
Dong, Xinying
;
Li, Xiong
;
Jia, Weijia
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2022/02/23
Cluster
Cryptography
False downstream data
Fog computing
Malicious node detection
Monitoring
Reliability
Routing
Security
Servers
Trajectory
VANET
Pricing and Budget Allocation for IoT Blockchain with Edge Computing
期刊论文
IEEE Transactions on Cloud Computing,2022
作者:
Ding, Xingjian
;
Guo, Jianxiong
;
Li, Deying
;
Wu, Weili
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2022/05/24
Blockchain
Blockchains
Edge computing
Edge computing
Games
Internet of things
Internet of Things
Security
Servers
Stackelberg game
Task analysis
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
期刊论文
IEEE Transactions on Cloud Computing,2022, 卷号: 10, 期号: 2, 页码: 1215 - 1232
作者:
Gu, Ke
;
Dong, XinYing
;
Jia, Weijia
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2022/06/22
Malicious node
fog computing
data security
reputation
VANETs
STMTO: A smart and trust multi-UAV task offloading system
期刊论文
Information Sciences,2021, 卷号: 573, 页码: 519-540
作者:
Guo, Jialin
;
Huang, Guosheng
;
Li, Qiang
;
Xiong, Neal N.
;
Zhang, Shaobo
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2021/12/02
Double auction model
Energy effective
Multi Unmanned Aerial Vehicles
Security
Task offloading
Trust