Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Huaqiu Long"'
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2020, Iss 1, Pp 1-21 (2020)
Abstract The safety of the Industrial Internet Control Systems has been a hotspot in the information security. To meet the needs of communication, a large variety of proprietary protocols have emerged in the field of industrial control. The protocol
Externí odkaz:
https://doaj.org/article/93919707a6ea4c459cb8b26367aeff1a
Publikováno v:
IEEE Access, Vol 8, Pp 29004-29020 (2020)
In recent years, with the opening of the “smart age” curtain, smart devices dominated by technologies such as robots, drones, and intelligent perception have gradually moved to the center of the Intelligent CPSS stage. However, the new security r
Externí odkaz:
https://doaj.org/article/6c64b9f91b354c9f8b79092e4d15fd57
Publikováno v:
IEEE Access, Vol 8, Pp 45512-45522 (2020)
This paper focuses on the targeted influence maximization based on cloud computing in social networks. Most of existing influence maximization works assume that the influence diffusion probabilities on edges are fixed, and identify the Top-k users to
Externí odkaz:
https://doaj.org/article/db5c4359a254490687cd8f3597272d3d
Publikováno v:
Complexity, Vol 2020 (2020)
The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. Due to the dual constraints of the hybrid feature of edge computi
Externí odkaz:
https://doaj.org/article/1412bf24e7c34787b39c4e8e22358287
Publikováno v:
Journal of Organizational and End User Computing. 34:1-23
Recent years, many online network communities, such as Facebook, Twitter, Tik Tok, Weibo, etc., have developed rapidly and become the bridge connecting physical social world and virtual cyberspace. Online network communities store a large number of s
Publikováno v:
World Wide Web. 25:2109-2138
Publikováno v:
IEEE Access, Vol 8, Pp 45512-45522 (2020)
This paper focuses on the targeted influence maximization based on cloud computing in social networks. Most of existing influence maximization works assume that the influence diffusion probabilities on edges are fixed, and identify the Top-k users to
Publikováno v:
IEEE Access, Vol 8, Pp 29004-29020 (2020)
In recent years, with the opening of the “smart age” curtain, smart devices dominated by technologies such as robots, drones, and intelligent perception have gradually moved to the center of the Intelligent CPSS stage. However, the new security r
Publikováno v:
2021 International Conference on Innovative Computing (ICIC).
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030699918
This paper studies the data privacy protection of industrial block chain. Aiming at the privacy leakage problem of industrial blockchain, combining symmetric encryption and homomorphic encryption, The data privacy protection method is proposed to ens
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ed5a56c986acf1b7775f90439929b3d
https://doi.org/10.1007/978-3-030-69992-5_7
https://doi.org/10.1007/978-3-030-69992-5_7