考試週
5 月
29
開放
時間
數據科學: 學科最新文章

Albert, C. C. Y., Zhu, L., Li, G., Guo, Y., Li, X., & Luo, R. (2022). Research on hotel energy intelligent monitoring system and service improvement based on data mining and cloud computing.


Meng, X., Yang, Y., Li, K., & Ying, Z. (2022). A Structure-Aware Adversarial Framework with the Keypoint Biorientation Field for Multiperson Pose Estimation. Wireless Communications and Mobile Computing, 2022. doi:10.1155/2022/3447827


Peng, S., Cai, Z., Liu, W., Wang, W., Li, G., Sun, Y., & Zhu, L. (2022). Blockchain Data Secure Transmission Method Based on Homomorphic Encryption. Computational Intelligence and Neuroscience, 2022. doi:10.1155/2022/3406228


Xing, L., Liu, W., Liu, X., Li, X., & Wang, H. (2022). Use of deep learning in nano image processing through the CNN model. Advances in Nano Research, 12(2), 185-195. doi:10.12989/anr.2022.12.2.185


Ying, Z., Cao, S., Liu, X., Ma, Z., Ma, J., & Deng, R. H. (2022). PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System. IEEE Transactions on Intelligent Transportation Systems. doi:10.1109/TITS.2022.3149600


Ying, Z., Ma, M., Zhao, Z., Liu, X., & Ma, J. (2022). A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon. IEEE Transactions on Vehicular Technology, 71(4), 3519-3532. doi:10.1109/TVT.2021.3106297


Yuan, J., Zhao, Q., Li, J., Li, J., Cai, Z., & Chang, Y. T. (2022). Edge mining resources allocation among normal and gap blockchains using game theory. Journal of Supercomputing. doi:10.1007/s11227-021-04249-7


Zhang, J., Li, T., Ying, Z., & Ma, J. (2022). Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT. IEEE Transactions on Cloud Computing. doi:10.1109/TCC.2022.3147226


Zhang, Y., Ying, Z., & Chen, C. L. P. (2022). Achieving Privacy-Preserving Multi-Task Allocation for Mobile Crowdsensing. IEEE Internet of Things Journal. doi:10.1109/JIOT.2022.3153473


Zhang, Y., Ying, Z., Zhao, B., & Chen, C. L. P. (2022). A privacy preserving data aggregation and query for metro passenger flow via mobile crowdsensing. Concurrency and Computation: Practice and Experience. doi:10.1002/cpe.6965


Peng, S., Cai, Z., Liu, W., Wang, W., Li, G., Sun, Y., & Zhu, L. (2022). Blockchain Data Secure Transmission Method Based on Homomorphic Encryption. Computational Intelligence and Neuroscience, 2022. doi:10.1155/2022/3406228


Liang, W., Ma, Y., Xu, W., Xu, Z., Jia, X., & Zhou, W. (2021). Request Reliability Augmentation with Service Function Chain Requirements in Mobile Edge Computing. IEEE Transactions on Mobile Computing. doi:10.1109/TMC.2021.3081681


Liu, J., Guo, R., Cai, Z., Liu, W., & Du, W. (2021). Assessing the Complexity of Intelligent Parks' Internet of Things Big Data System. Complexity, 2021. doi:10.1155/2021/5528135


Lu, J., Zheng, X., Tang, L., Zhang, T., Z. Sheng, Q., Wang, C., . . . Zhou, W. (2021).  Can Steering Wheel Detect Your Driving Fatigue?  IEEE Transactions on Vehicular Technology, 70(6), 5537-5550. doi:10.1109/TVT.2021.3072936


Peng, S., Zhu, L., Cai, Z., Liu, W., He, C., & Tang, W. (2021). Dynamic Optimization of Government Data Transmission Based on Blockchain Technology. Mobile Information Systems, 2021. doi:10.1155/2021/8948323


Qu, Y., Yu, S., Zhou, W., Chen, S., & Wu, J. (2021). Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. IEEE Transactions on Network Science and Engineering, 8(1), 269-281. doi:10.1109/TNSE.2020.3036855


Shao, K., Xiong, Q., & Cai, Z. (2021). FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection. Security and Communication Networks, 2021. doi:10.1155/2021/6642252


薛玉潔,陳蘭香 & 穆怡.(2022). 基于BTM主題模型的對稱可搜索加密方案. 密碼學報(01),88-105. doi:10.13868/j.cnki.jcr.000505.


鐘洋,畢仁萬,顏西山,應作斌 & 熊金波.. 支持隱私保護訓練的高效同態神經網絡. 計算機應用. doi:10.11772/j.issn.1001-9081.2021101775.