咨询与建议

限定检索结果

文献类型

  • 288 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 294 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 217 篇 工学
    • 197 篇 计算机科学与技术...
    • 122 篇 软件工程
    • 81 篇 信息与通信工程
    • 50 篇 电气工程
    • 16 篇 控制科学与工程
    • 15 篇 测绘科学与技术
    • 13 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 生物工程
    • 9 篇 建筑学
    • 7 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 4 篇 农业工程
  • 54 篇 理学
    • 37 篇 数学
    • 13 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 7 篇 大气科学
    • 6 篇 系统科学
    • 4 篇 物理学
    • 4 篇 化学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 7 篇 法学
    • 5 篇 法学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 医学
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 70 篇 internet of thin...
  • 19 篇 edge computing
  • 19 篇 cloud computing
  • 18 篇 internet
  • 18 篇 blockchain
  • 13 篇 protocols
  • 12 篇 iot
  • 10 篇 servers
  • 8 篇 computer archite...
  • 8 篇 security
  • 7 篇 peer to peer com...
  • 7 篇 task analysis
  • 6 篇 bandwidth
  • 6 篇 artificial intel...
  • 6 篇 fog computing
  • 6 篇 privacy
  • 6 篇 distributed data...
  • 6 篇 heuristic algori...
  • 5 篇 internet of thin...
  • 5 篇 reinforcement le...

机构

  • 3 篇 beijing advanced...
  • 3 篇 school of automa...
  • 3 篇 bisite research ...
  • 2 篇 college of compu...
  • 2 篇 china electric p...
  • 2 篇 chinese acad sci...
  • 2 篇 univ kiel kiel
  • 2 篇 state key labora...
  • 2 篇 univ chinese aca...
  • 2 篇 wuhan univ techn...
  • 2 篇 pcl research cen...
  • 2 篇 sustech institut...
  • 2 篇 huazhong univers...
  • 2 篇 univ new mexico ...
  • 2 篇 wuhan univ techn...
  • 2 篇 chinese acad sci...
  • 2 篇 chongqing univer...
  • 2 篇 northeast branch...
  • 2 篇 univ exeter coll...
  • 2 篇 international in...

作者

  • 3 篇 jia weijia
  • 3 篇 qingdong li
  • 3 篇 xiwang dong
  • 3 篇 zhang ren
  • 3 篇 zhang wei
  • 3 篇 wu yulei
  • 2 篇 duan pengfei
  • 2 篇 yi xiaoyin
  • 2 篇 sarigiannidis pa...
  • 2 篇 eirini eleni tsi...
  • 2 篇 lagkas thomas
  • 2 篇 sittón-candanedo...
  • 2 篇 yang yang
  • 2 篇 aras emekcan
  • 2 篇 chamola vinay
  • 2 篇 ge jingguo
  • 2 篇 zhang yan
  • 2 篇 zhao feng
  • 2 篇 yongzhao hua
  • 2 篇 gupta vatsal

语言

  • 267 篇 英文
  • 27 篇 其他
检索条件"任意字段=16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020"
294 条 记 录,以下是11-20 订阅
排序:
Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption  21
Power Grid Encrypted Data Range Filtering Scheme Based on Or...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Qiao, Hongyi Peng, Cong Luo, Min Wu, Po He, Debiao Wuhan University School of Cyber Science & Engineering Wuhan China Electric Power Research Institute State Grid Henan Electric Power Company Zhengzhou China
As the power internet of things (IoT) system accelerates, the IoT end devices within the power grid show an explosive growth, and generate massive electricity consumption data. While the diverse encryption technologie... 详细信息
来源: 评论
Fine-grained IoT device identification method based on self-supervised ViT  21
Fine-grained IoT device identification method based on self-...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Peng, Kai Lu, Tong Mei, Song Xue, Nannan Shen, Yongchao Hu, Menglan Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan China
the proliferation of internet of things(IoT) technology has introduced challenges in device management and network security due to the heterogeneous nature of IoT devices and the inherent security risks they pose. Ach... 详细信息
来源: 评论
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring  21
Partial Deep Domain Adaptation for Non-Intrusive Load Monito...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Yuying Yang, Yang Wang, Chen Liu, Runqin Jiang, Hongbo Liu, Wenping Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education School of Artificial Intelligence Wuhan China Huazhong University of Science and Technology Wuhan China China Unicom Central South Research Institute Changsha China Hunan University Changsha China Hubei University of Economics Wuhan China
With the widespread deployment of smart meters and the burgeoning integration of the Ubiquitous Power internet of things (UPIoT), Non-Intrusive Load Monitoring (NILM) has emerged as an essential technology, providing ... 详细信息
来源: 评论
Ranking on Heterogeneous Manifold for Multimodal Information Retrieval  21
Ranking on Heterogeneous Manifold for Multimodal Information...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Wan, Xingshi Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business University Wuhan Research Institute of Posts and Telecommunications Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science & Technology Wuhan China
In light of recent advancements in internet of Multimedia things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS... 详细信息
来源: 评论
DRL Based on Priority Evaluation for Collaborative Perception Task Offloading in internet of Vehicles  16
DRL Based on Priority Evaluation for Collaborative Perceptio...
收藏 引用
16th international conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Huang, Xiaoge Yu, Caiwei Li, Wenjing Liang, ChengChao Chen, Qianbin School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China
With the explosive growth of the internet of Vehicles (IoVs), autonomous driving has received numerous attention from academia and industry. However, the limited perceivable range of a single connected and automated v... 详细信息
来源: 评论
Traceable Ring Signature Scheme in internet of Vehicles Based on Lattice Cryptography  21
Traceable Ring Signature Scheme in Internet of Vehicles Base...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Liao, Wei Han, Lansheng Chen, Peng Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Lattice cryptography, as a recognized Cryptosystem that can resist quantum computation, has great potential for development. Lattice based signature scheme is currently a research focus. In this paper, the traceable r... 详细信息
来源: 评论
Graph-based Multi-view Clustering for Web services  21
Graph-based Multi-view Clustering for Web services
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Yang, Wang Zhenzhen, Yuan Guosheng, Kang Buqing, Cao Jianxun, Liu Yong, Xiao Hnust Xiangtan China Hunan University of Science and Technology Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Xiangtan China School of Computer Science and Engineering China
the number of Web services on the internet has been steadily increasing in recent years due to their growing popularity. Under the big data environment, how to effectively manage Web services is of significance for se... 详细信息
来源: 评论
A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding Services  21
A Decentralized Vehicle-to-Vehicle Energy Trading System Bas...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Meng, Kun Sun, Lijun Chen, Xiao Wu, Haiqin Li, Shuaiyong Qingdao University of Science and Technology College of Information Science and Technology Shandong China University of Leicester School of Computing and Mathematical Sciences Leicester United Kingdom Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of Education Chongqing China
Vehicle-to-vehicle (V2V) energy trading stands as a significant technology, allowing electric vehicles (EVs) to share energy. this balances energy demand and supply, reducing pressure on the power grid. However, two s... 详细信息
来源: 评论
A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed Study  21
A New Dataset for Intrusion Detection in Industrial Control ...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Deng, Longmin Zhang, Xuemin Zheng, Qianrong Zhao, Dongdong Zhou, Junwei Xiang, Jianwen Wuhan University of Technology Hubei Key Laboratory of Transportation of Internet of Things School of Computer Science and Artifical Intelligence Wuhan China Wuhan University of Technology Chongqing Research Institute Chongqing China
the security of Industrial Control Systems (ICS) is a critical issue that has gained increasing attention in recent years. Machine learning based intrusion detection systems (IDS) have shown promise in detecting previ... 详细信息
来源: 评论
the Pivot: Identifying Emergent Tactics in distributed Epistemic Games  16
The Pivot: Identifying Emergent Tactics in Distributed Epist...
收藏 引用
16th international conference on Computer-Supported Collaborative Learning, CSCL 2023
作者: Matthews, Jenna Swanson, Hillary Utah State University United States
the theoretical machinery of epistemic forms and games has been used to describe the knowledge-building processes of individuals. Humanity is faced with challenging problems in an increasingly complex world, and it is... 详细信息
来源: 评论