Zobrazeno 1 - 10
of 127
pro vyhledávání: '"Fuhong Lin"'
Publikováno v:
IET Communications, Vol 18, Iss 7, Pp 429-436 (2024)
Abstract Nowadays, the development of Artificial Intelligence of Things (AIoT) is advancing rapidly, and intelligent devices are increasingly exposed to more security risks on the network. Deep learning‐based intrusion detection is an effective sec
Externí odkaz:
https://doaj.org/article/b63fc36f1cf14048accb0c737abfb66f
Autor:
Sixian Chen, Haitao Ren, Fuhong Lin, Siyuan Fan, Yuze Cao, Weili Zhao, Hongzhi Guan, the Encephalitis Collaborative Group
Publikováno v:
Brain and Behavior, Vol 13, Iss 5, Pp n/a-n/a (2023)
Abstract Objective To describe the clinical and radiological characteristics of anti‐metabotropic glutamate receptor 5 (mGluR5) encephalitis. Methods We reviewed the clinical data of five patients with anti‐mGluR5 encephalitis, and performed a li
Externí odkaz:
https://doaj.org/article/900ef3e0fb81460db440b31ccf8e9ac7
Publikováno v:
IEEE Access, Vol 8, Pp 8101-8113 (2020)
The emergence of the 5G network has brought broad prospects for the massive terminal access and ubiquitous Internet of Things (IoTs). Potential attacking opportunities triggered by this progress are severely impacting the security fortress of current
Externí odkaz:
https://doaj.org/article/f611c034e6ab49c89150a81cea819919
Publikováno v:
Frontiers in Cell and Developmental Biology, Vol 10 (2022)
Adipose-derived stem cells (ADSCs) are able to modulate the immune response and are used for treating ulcerative colitis (UC). However, it is possible that ADSCs from patients with inflammatory or autoimmune disorders may show defective immunosuppres
Externí odkaz:
https://doaj.org/article/b0262b6156424c3caebb611f70bf76ae
Publikováno v:
IEEE Access, Vol 7, Pp 53677-53686 (2019)
With the development of the Internet and mobile technologies, the Internet of Things (IoT) era has arrived. Vehicle networking technology can not only facilitate people's travel but also effectively alleviate traffic congestion. The development of fo
Externí odkaz:
https://doaj.org/article/693747459b084945829dce46e89b5673
Publikováno v:
IEEE Access, Vol 7, Pp 21879-21888 (2019)
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs due to the communication overh
Externí odkaz:
https://doaj.org/article/1d11c7f6d8014d7ba06c6382f8d45c32
Publikováno v:
IEEE Access, Vol 7, Pp 185148-185156 (2019)
The green Internet of Things (IoT) technology has increased the need for a more emotion-connected human-computer interaction. The lower network latency and longer battery life ensure the continuous and real-time work of human-computer interaction sys
Externí odkaz:
https://doaj.org/article/6ee5905d72da4fefa322572e2c604854
Publikováno v:
IEEE Access, Vol 7, Pp 116886-116899 (2019)
Mobile-Edge Computing (MEC) is a new computing paradigm that provides a capillary distribution of cloud computing capabilities to the network edge. In this paper, we studied the security defense problem in MEC network environment. One big challenge i
Externí odkaz:
https://doaj.org/article/2c088b16f42648b1b7746c08484a4311
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2018, Iss 1, Pp 1-9 (2018)
Abstract The birth of fog computing has given rise to many security threats. Distributed denial of service (DDoS) attacks by intruders on fog nodes will cause system resources to be illegally appropriate. Intrusion detection system (IDS) is a powerfu
Externí odkaz:
https://doaj.org/article/eaaae08cb66d4a1792bdcc27bcff0d01
Publikováno v:
Dianxin kexue, Vol 34, Pp 135-147 (2018)
With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the sec
Externí odkaz:
https://doaj.org/article/9c94294798584addbf85a478079fbc5c