咨询与建议

限定检索结果

文献类型

  • 44 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32 篇 工学
    • 16 篇 计算机科学与技术...
    • 8 篇 电子科学与技术(可...
    • 8 篇 控制科学与工程
    • 5 篇 软件工程
    • 5 篇 网络空间安全
    • 4 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 7 篇 理学
    • 7 篇 数学
  • 4 篇 医学
    • 3 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 农业资源与环境
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 6 篇 blockchain
  • 3 篇 deep learning
  • 2 篇 internet of thin...
  • 2 篇 markov on-off st...
  • 2 篇 deep neural netw...
  • 2 篇 swarm
  • 2 篇 generative adver...
  • 2 篇 cryptographic co...
  • 2 篇 data storage
  • 2 篇 cognitive radio
  • 2 篇 smart contract
  • 2 篇 ensemble
  • 2 篇 gpu
  • 1 篇 polar code
  • 1 篇 multi-tenant
  • 1 篇 particle
  • 1 篇 piecewise convol...
  • 1 篇 trajectory sched...
  • 1 篇 object detection
  • 1 篇 multivariate tim...

机构

  • 24 篇 school of comput...
  • 13 篇 school of comput...
  • 6 篇 computer science...
  • 5 篇 department of co...
  • 3 篇 school of system...
  • 3 篇 beijing engineer...
  • 3 篇 school of inform...
  • 3 篇 school of inform...
  • 3 篇 beijing key labo...
  • 2 篇 school of comput...
  • 2 篇 business school ...
  • 2 篇 department of en...
  • 2 篇 amphenol assembl...
  • 2 篇 school of comput...
  • 2 篇 school of automa...
  • 2 篇 school of civil ...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 school of system...
  • 2 篇 school of busine...

作者

  • 19 篇 jin wang
  • 8 篇 osama alfarraj
  • 8 篇 r.simon sherratt
  • 6 篇 amr tolba
  • 5 篇 gwang-jun kim
  • 5 篇 jian liu
  • 4 篇 lei wang
  • 4 篇 yongjun ren
  • 4 篇 alan yang
  • 3 篇 pradip kumar sha...
  • 3 篇 haijun zhang
  • 3 篇 feng li
  • 3 篇 yu gao
  • 2 篇 wei li
  • 2 篇 xiaofeng yu
  • 2 篇 jinbin hu
  • 2 篇 se-jung lim
  • 2 篇 shuying rao
  • 2 篇 shiming he
  • 2 篇 weiwei liu

语言

  • 47 篇 英文
检索条件"机构=School of Computer&Communication Engineering"
47 条 记 录,以下是11-20 订阅
排序:
Data Secure Storage Mechanism for IIoT Based on Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4029-4048页
作者: Jin Wang Guoshu Huang R.Simon Sherratt Ding Huang Jia Ni School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Systems Engineering The University of ReadingReadingRG66AYUK School of Computer Nanjing University of Information Science and TechnologyNanjing210044China
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... 详细信息
来源: 评论
Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 401-416页
作者: Lei Wang Jian Liu Changming Zhao Alan Yang School of Computer&Communication Engineering University of Science and Technology BeijingBeijing100083China School of Computer Science Chengdu University of Information TechnologyChengdu610225China College of Computer Science Sichuan UniversityChengdu610041China Amphenol Assemble Tech HoustonTX 77070USA
In this paper,we investigate the performance of secondary transmission scheme based on Markov ON-OFF state of primary users in Underlay cognitive radio *** propose flexible secondary cooperative transmission schemewit... 详细信息
来源: 评论
Secure and Efficient Data Transmission Scheme Based on Physical Mechanism
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3589-3605页
作者: Ping Zhang Haoran Zhu Wenjun Li Osama Alfarraj Amr Tolba Gwang-jun Kim School of Computer Science Hunan University of Technology and BusinessChangsha410205China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Engineering Chonnam National UniversityGwangju61186Korea
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physi... 详细信息
来源: 评论
Demand Prediction Based Slice Reconfiguration Using Dueling Deep Q-Network
收藏 引用
China communications 2022年 第5期19卷 267-285页
作者: Wanqing Guan Haijun Zhang School of Computer&Communication Engineering University of Science and Technology BeijingBeijing 100083China Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services Institute of Artificial IntelligenceUniversity of Science and Technology BeijingBeijing 100083China
To satisfy diversified service demands of vertical industries,network slicing enables efficient resource allocation of a common infrastructure by creating isolated logical ***,uncertainty and dynamics of service deman... 详细信息
来源: 评论
DoS Attack Detection Based on Deep Factorization Machine in SDN
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1727-1742页
作者: Jing Wang Xiangyu Lei Qisheng Jiang Osama Alfarraj Amr Tolba Gwang-jun Kim School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Engineering Chonnam National UniversityGwangju61186Korea
Software-Defined Network(SDN)decouples the control plane of network devices from the data *** alleviating the problems presented in traditional network architectures,it also brings potential security risks,particularl... 详细信息
来源: 评论
Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems
收藏 引用
computers, Materials & Continua 2020年 第12期65卷 2511-2527页
作者: Weiwei Liu Yang Tang Fei Yang Chennan Zhang Dun Cao Gwang-jun Kim Business School University of Shanghai for Science and TechnologyShanghai200093China Zhejiang University Urban and Rural Planning&Design Institute Hangzhou310023China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China Department of Computer Engineering Chonnam National UniversityGwangju61186Korea
Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable ***,it is necessary to establish an urban transport network vulnerability ass... 详细信息
来源: 评论
Task Coordination Organization Model and the Task Allocation Algorithm for Resource Contention of the Syncretic System
收藏 引用
Tsinghua Science and Technology 2016年 第4期21卷 459-470页
作者: Danfeng Wu Guangping Zeng Di He Zhaopeng Qian Qingchuan Zhang School of Computer&Communication Engineering University of Science&Technology BeijingBeijing 100083China School of Software Liaoning Technical UniversityHuludao 125105China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing 100083China Graduate Center City University of New YorkNew YorkNY 10016USA
At present, robot embedded systems have some common problems such as closure and poor dynamic evolution. Aiming at resolving this situation, our paper focuses on improvements to the robot embedded system and sets up a... 详细信息
来源: 评论
Distributed Secure Storage Scheme Based on Sharding Blockchain
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4485-4502页
作者: Jin Wang Chenchen Han Xiaofeng Yu Yongjun Ren R.Simon Sherratt School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Business Nanjing UniversityNanjing210093China School of Computer School of SoftwareSchool of Cyberspace SecurityEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science&TechnologyNanjing210044China Department of Biomedical Engineering University of ReadingRG66AYUK
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as in... 详细信息
来源: 评论
Data Security Storage Mechanism Based on Blockchain Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 4933-4950页
作者: Jin Wang WeiOu Wenhai Wang RSimon Sherratt Yongjun Ren Xiaofeng Yu School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Control Science and Engineering Zhejiang UniversityHangzhou310058China School of Systems Engineering The University of ReadingReadingRG66AYUK School of Computer Engineering Research Center of Digital Forensics of Ministry of EducationNanjing University of Information Science&TechnologyNanjing210044China School of Business Nanjing UniversityNanjing210093China
With the rapid development of information technology,the development of blockchain technology has also been deeply *** performing block verification in the blockchain network,if all transactions are verified on the ch... 详细信息
来源: 评论
An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 711-725页
作者: Jin Wang Yu Gao Wei Liu Wenbing Wu Se-Jung Lim Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer&Communication EngineeringChangsha University of Science&TechnologyChangsha410114China School of Information Science and Engineering Fujian University of TechnologyFuzhou350000China College of Information Engineering Yangzhou UniversityYangzhou225000China Department of Computer Engineering Chonnam National UniversityYeosu596597Korea.
Recently,Wireless sensor networks(WSNs)have become very popular research topics which are applied to many *** provide pervasive computing services and techniques in various potential applications for the Internet of T... 详细信息
来源: 评论