服務指南
Albert, C. C. Y., Zhu, L., Li, G., Guo, Y., Li, X., & Luo, R. (2022). Research on hotel energy intelligent monitoring system and service improvement based on data mining and cloud computing.
Meng, X., Yang, Y., Li, K., & Ying, Z. (2022). A Structure-Aware Adversarial Framework with the Keypoint Biorientation Field for Multiperson Pose Estimation. Wireless Communications and Mobile Computing, 2022. doi:10.1155/2022/3447827
Peng, S., Cai, Z., Liu, W., Wang, W., Li, G., Sun, Y., & Zhu, L. (2022). Blockchain Data Secure Transmission Method Based on Homomorphic Encryption. Computational Intelligence and Neuroscience, 2022. doi:10.1155/2022/3406228
Xing, L., Liu, W., Liu, X., Li, X., & Wang, H. (2022). Use of deep learning in nano image processing through the CNN model. Advances in Nano Research, 12(2), 185-195. doi:10.12989/anr.2022.12.2.185
Ying, Z., Cao, S., Liu, X., Ma, Z., Ma, J., & Deng, R. H. (2022). PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System. IEEE Transactions on Intelligent Transportation Systems. doi:10.1109/TITS.2022.3149600
Ying, Z., Ma, M., Zhao, Z., Liu, X., & Ma, J. (2022). A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon. IEEE Transactions on Vehicular Technology, 71(4), 3519-3532. doi:10.1109/TVT.2021.3106297
Yuan, J., Zhao, Q., Li, J., Li, J., Cai, Z., & Chang, Y. T. (2022). Edge mining resources allocation among normal and gap blockchains using game theory. Journal of Supercomputing. doi:10.1007/s11227-021-04249-7
Zhang, J., Li, T., Ying, Z., & Ma, J. (2022). Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT. IEEE Transactions on Cloud Computing. doi:10.1109/TCC.2022.3147226
Zhang, Y., Ying, Z., & Chen, C. L. P. (2022). Achieving Privacy-Preserving Multi-Task Allocation for Mobile Crowdsensing. IEEE Internet of Things Journal. doi:10.1109/JIOT.2022.3153473
Zhang, Y., Ying, Z., Zhao, B., & Chen, C. L. P. (2022). A privacy preserving data aggregation and query for metro passenger flow via mobile crowdsensing. Concurrency and Computation: Practice and Experience. doi:10.1002/cpe.6965
Peng, S., Cai, Z., Liu, W., Wang, W., Li, G., Sun, Y., & Zhu, L. (2022). Blockchain Data Secure Transmission Method Based on Homomorphic Encryption. Computational Intelligence and Neuroscience, 2022. doi:10.1155/2022/3406228
Liang, W., Ma, Y., Xu, W., Xu, Z., Jia, X., & Zhou, W. (2021). Request Reliability Augmentation with Service Function Chain Requirements in Mobile Edge Computing. IEEE Transactions on Mobile Computing. doi:10.1109/TMC.2021.3081681
Liu, J., Guo, R., Cai, Z., Liu, W., & Du, W. (2021). Assessing the Complexity of Intelligent Parks' Internet of Things Big Data System. Complexity, 2021. doi:10.1155/2021/5528135
Lu, J., Zheng, X., Tang, L., Zhang, T., Z. Sheng, Q., Wang, C., . . . Zhou, W. (2021). Can Steering Wheel Detect Your Driving Fatigue? IEEE Transactions on Vehicular Technology, 70(6), 5537-5550. doi:10.1109/TVT.2021.3072936
Peng, S., Zhu, L., Cai, Z., Liu, W., He, C., & Tang, W. (2021). Dynamic Optimization of Government Data Transmission Based on Blockchain Technology. Mobile Information Systems, 2021. doi:10.1155/2021/8948323
Qu, Y., Yu, S., Zhou, W., Chen, S., & Wu, J. (2021). Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. IEEE Transactions on Network Science and Engineering, 8(1), 269-281. doi:10.1109/TNSE.2020.3036855
Shao, K., Xiong, Q., & Cai, Z. (2021). FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection. Security and Communication Networks, 2021. doi:10.1155/2021/6642252
薛玉潔,陳蘭香 & 穆怡.(2022). 基于BTM主題模型的對稱可搜索加密方案. 密碼學報(01),88-105. doi:10.13868/j.cnki.jcr.000505.
鐘洋,畢仁萬,顏西山,應作斌 & 熊金波.. 支持隱私保護訓練的高效同態神經網絡. 計算機應用. doi:10.11772/j.issn.1001-9081.2021101775.