Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Zhiyang Li"'
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
As a large number of mobile terminals are connected to the IoT, the security problem of IoT is a challenge to the IoT technology. Blockchain technology has the characteristics of decentralization, data encryption, smart contract, and so on, especiall
Publikováno v:
IEEE Internet of Things Journal. 7:10594-10605
One of the most important problems for categorized radio-frequency identification systems is to find large categories and small categories. In this article, we propose a protocol that can find the large categories and the small categories quickly. Th
Publikováno v:
Journal of Network and Computer Applications. 132:40-48
Radio Frequency IDentification (RFID) technology is widely used in the inventory management of goods. Fast searching a subset consisting of some particular target tags is of practical importance for a variety of applications. Existing protocols are i
Publikováno v:
Expert Systems. 38
Publikováno v:
SmartIoT
Discovering Frequent itemsets over uncertain databases has become a hot topic in data mining community due to the wide application of uncertain data. Several algorithms are proposed to mine frequent itemsets over uncertain data. However, the existing
Publikováno v:
IEEE Communications Letters. 21:1067-1070
A superpoint is a host that communicates with a large number of distinct destinations (sources) within a measurement period. Identifying superpoints is an important and meaningful task for network security and monitoring. To keep up with the line spe
Publikováno v:
International Journal of Database Theory and Application. 9:195-206
Publikováno v:
International Journal of Security and Its Applications. 10:79-88
Differential privacy is a security guarantee model which widely used in privacy preserving data publishing, but the query result can’t be used in data research directly, especially in high-dimensional datasets. To address this problem, we propose a
Publikováno v:
Ad Hoc Networks. 35:105-115
Subspace skyline, as an important variant of skyline, has been widely applied for multiple-criteria decisions, business planning. With the development of mobile internet, subspace skyline query in mobile distributed environments has recently attracte
Publikováno v:
Computer Communications. 67:66-74
Distributed denial-of-service (DDoS) attacks pose a great threat to the data center, and many defense mechanisms have been proposed to detect it. On one hand, many services deployed in data center can easily lead to corresponding DDoS attacks. On the