Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Zhiyang Li"'
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
As a large number of mobile terminals are connected to the IoT, the security problem of IoT is a challenge to the IoT technology. Blockchain technology has the characteristics of decentralization, data encryption, smart contract, and so on, especiall
Publikováno v:
IEEE Internet of Things Journal. 7:10594-10605
One of the most important problems for categorized radio-frequency identification systems is to find large categories and small categories. In this article, we propose a protocol that can find the large categories and the small categories quickly. Th
Publikováno v:
Journal of Network and Computer Applications. 132:40-48
Radio Frequency IDentification (RFID) technology is widely used in the inventory management of goods. Fast searching a subset consisting of some particular target tags is of practical importance for a variety of applications. Existing protocols are i
Publikováno v:
SmartIoT
Discovering Frequent itemsets over uncertain databases has become a hot topic in data mining community due to the wide application of uncertain data. Several algorithms are proposed to mine frequent itemsets over uncertain data. However, the existing
Publikováno v:
IEEE Communications Letters. 21:1067-1070
A superpoint is a host that communicates with a large number of distinct destinations (sources) within a measurement period. Identifying superpoints is an important and meaningful task for network security and monitoring. To keep up with the line spe
Publikováno v:
International Journal of Security and Its Applications. 10:79-88
Differential privacy is a security guarantee model which widely used in privacy preserving data publishing, but the query result can’t be used in data research directly, especially in high-dimensional datasets. To address this problem, we propose a
Publikováno v:
Ad Hoc Networks. 35:105-115
Subspace skyline, as an important variant of skyline, has been widely applied for multiple-criteria decisions, business planning. With the development of mobile internet, subspace skyline query in mobile distributed environments has recently attracte
Publikováno v:
Computer Communications. 67:66-74
Distributed denial-of-service (DDoS) attacks pose a great threat to the data center, and many defense mechanisms have been proposed to detect it. On one hand, many services deployed in data center can easily lead to corresponding DDoS attacks. On the
Publikováno v:
Concurrency and Computation: Practice and Experience. 27:4156-4171
Summary Reverse nearest neighbor (RNN) queries are the complimentary problem and particular interest in the past few years, such as location-based services, profile-based marketing, resource allocation, and traffic monitoring system. The one major dr
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 25:3135-3144
k-means is undoubtedly one of the most popular clustering algorithms owing to its simplicity and efficiency. However, this algorithm is highly sensitive to the chosen initial centers and thus a proper initialization is crucial for obtaining an ideal