咨询与建议

限定检索结果

文献类型

  • 82 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 30 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 17 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 农业工程
  • 17 篇 理学
    • 10 篇 数学
    • 5 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 大气科学
  • 11 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 农学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 11 篇 privacy
  • 8 篇 differential pri...
  • 6 篇 routing
  • 5 篇 conferences
  • 5 篇 publishing
  • 5 篇 vehicular ad hoc...
  • 4 篇 roads
  • 4 篇 task analysis
  • 4 篇 delays
  • 4 篇 energy consumpti...
  • 4 篇 servers
  • 4 篇 itemsets
  • 4 篇 blockchain
  • 4 篇 protocols
  • 4 篇 software
  • 4 篇 sensors
  • 3 篇 simulation
  • 3 篇 relays
  • 3 篇 wireless communi...
  • 3 篇 bandwidth

机构

  • 22 篇 college of compu...
  • 19 篇 inner mongolia a...
  • 11 篇 inner mongolia k...
  • 9 篇 inner mongolia k...
  • 9 篇 inner mongolia k...
  • 6 篇 inner mongolia k...
  • 5 篇 inner mongolia a...
  • 4 篇 engineering rese...
  • 3 篇 college of compu...
  • 3 篇 inner mongolia u...
  • 2 篇 college of compu...
  • 2 篇 ordos dongsheng ...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia k...
  • 2 篇 inner mongolia p...
  • 1 篇 inner mongolia a...
  • 1 篇 inner mongolia a...
  • 1 篇 inner mongolia u...
  • 1 篇 geomechanica inc

作者

  • 29 篇 xiangyu bai
  • 13 篇 bai xiangyu
  • 11 篇 baoqi huang
  • 9 篇 bo cui
  • 8 篇 xu gang
  • 8 篇 xuebin ma
  • 7 篇 kexin zhou
  • 7 篇 huang baoqi
  • 7 篇 gang xu
  • 7 篇 cui bo
  • 6 篇 zhaoran wang
  • 6 篇 wuyungerile li
  • 6 篇 jia bing
  • 6 篇 bing jia
  • 5 篇 wang zhaoran
  • 4 篇 wenhan hou
  • 3 篇 shengyi guan
  • 3 篇 lei yao
  • 3 篇 hao lifei
  • 3 篇 zhou kexin

语言

  • 84 篇 英文
检索条件"机构=Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing"
84 条 记 录,以下是21-30 订阅
排序:
Detecting Phishing Scams on Ethereum Using Graph Convolutional Networks with Conditional random Field  24
Detecting Phishing Scams on Ethereum Using Graph Convolution...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Hou, Wenhan Cui, Bo Li, ru College of Computer Science Inner Mongolia University Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
As an innovative technology of great significance, blockchain has been widely used in various walks of life. Meanwhile, scams have experienced rapid growth on the blockchain, the phishing scam is a classic fraud among... 详细信息
来源: 评论
Automatic road Disaster Detection Technologies: A Comprehensive review of Developmental Progress
Automatic Road Disaster Detection Technologies: A Comprehens...
收藏 引用
2023 International Conference on Electronic Information Engineering and Data Processing, EIEDP 2023
作者: Zhu, Jieqi Bai, Xiangyu Wang, Zha.r.n Nation’s Inner Mongolia Key Laboratory of Wireless Networking Mobile Computing College of Computer Inner Mongolia University China
As a strip building laid on the ground, highways are prone to road hazards such as pavement cracks, potholes, subsidence, tension cracks, extrusion bumps, and distortion deformation with the increase of service life. ... 详细信息
来源: 评论
Comparation of UAV Path Planning for Logistics Distribution  6th
Comparation of UAV Path Planning for Logistics Distribution
收藏 引用
6th International Conference on Intelligent Transportation Engineering, ICITE 2021
作者: Wang, Guotai Bai, Xiangyu Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
In recent years, unmanned a.r.al vehicle (UAV), has been increasingly applied to research in various fields due to its small size and fast speed. Among them, the path planning of UAV under various actual environmental... 详细信息
来源: 评论
ATDG: An Automatic Cyber Threat Intelligence Extraction Model of DPCNN and BIGrU Combined with Attention Mechanism  24th
ATDG: An Automatic Cyber Threat Intelligence Extraction Mode...
收藏 引用
24th International Conference on Web Information Systems Engineering, WISE 2023
作者: Cui, Bo Li, Jinling Hou, Wenhan Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
With the situation of cyber security becoming more and more complex, the mining and analysis of Cyber Threat Intelligence (CTI) have become a prominent focus in the field of cyber security. Social media platforms like... 详细信息
来源: 评论
research on Fine-grained Security Sharing Model of Medical Information Based on Blockchain  29
Research on Fine-grained Security Sharing Model of Medical I...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Cui, Bo Chen, Zeyu Inner Mongolia University Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Hohhot China
In light of the vulnerabilities in traditional medical information systems, including the susceptibility to malicious tampering of patients' medical records, opaque access decisions, and challenges in data sharing... 详细信息
来源: 评论
research on access control of smart home in NDN (Short Paper)  14th
Research on access control of smart home in NDN (Short Paper...
收藏 引用
14th EAI International Conference on Collaborative computing: networking, Applications and Worksharing, CollaborateCom 2018
作者: Wu, rina Cui, Bo Li, ru Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot010021 China
Named Data networking (NDN) is one of the future Internet architectures and can support smart home very well. There is a large amount of private data with lower security level in smart home. Access control is an effec... 详细信息
来源: 评论
A Survey on Blockchain Abnormal Transaction Detection  5th
A Survey on Blockchain Abnormal Transaction Detection
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Liu, Shuai Cui, Bo Hou, Wenhan Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot010021 China
Blockchain technology has undergone rapid development in recent years, transactions on Blockchains, represented by prominent examples such as Bitcoin and Ethereum, are rapidly increasing in number. However, with the l... 详细信息
来源: 评论
Seed Node Selection Algorithm Based on Node Influence in Opportunistic Offloading  28
Seed Node Selection Algorithm Based on Node Influence in Opp...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Tang, Qi Hang, ruijie Xu, Gang Zhang, Gaofeng Li, Shuai Huang, Baoqi College of Computer Science Inner Mongolia University Hohhot010021 China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot010021 China Ordos Dongsheng Manshi Middle School Ordos017000 China
As a kind of mobile traffic offloading technology, opportunistic triage downloads and distributes data through seed nodes. Therefore, how to efficiently and accurately select suitable seed nodes becomes a key problem ... 详细信息
来源: 评论
a.r.search of Vehicle Ad Hoc Network Incentive Mechanism
A Research of Vehicle Ad Hoc Network Incentive Mechanism
收藏 引用
International Conference on Electronics Information and Emergency Communication
作者: Xiaojuan Zhang Xiangyu Bai Qi Liu Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University China
Vehicle Ad Hoc Network (VANET) is an on-board self-organizing network. The communication modes of VANET mainly include V2V and V2r. Due to the unique characteristics of VANET, such as high mobility and intermittent co... 详细信息
来源: 评论
research of routing Strategies Based on Network Encoding Under Vehicle networking
Research of Routing Strategies Based on Network Encoding Und...
收藏 引用
International Conference on Electronics Information and Emergency Communication
作者: Hua Zhang Bo Cui Xiangyu Bai Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University China
Vehicular ad-hoc network (VANET) is a mobile Ad-hoc network composed of vehicles and roadside access points. It is a wireless network that enables information communication between vehicles and vehicles, between vehic... 详细信息
来源: 评论