Zobrazeno 1 - 10
of 96
pro vyhledávání: '"Shihong Zou"'
Publikováno v:
IEEE Access, Vol 7, Pp 65544-65559 (2019)
With the widespread popularity of Internet-enabled devices, mobile users can request and receive messages anytime and anywhere, which facilitates information feedback for smart city management. However, few people are willing to reflect or report som
Externí odkaz:
https://doaj.org/article/2b56a7ca7bc24090b2d21548dcd77884
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 5, Iss 1, Pp 69-70 (2009)
Externí odkaz:
https://doaj.org/article/329b51b724da4586a3207ec724ab3ac1
Publikováno v:
Security and Communication Networks. 2023:1-11
Since the continuous authentication (CA) system based on smartphone sensors has been facing the challenge of the low-data regime under some practical scenarios, which leads to low accuracy of CA, it needs to be solved urgently. To this end, currently
Publikováno v:
IEEE Systems Journal. 16:4938-4949
Publikováno v:
IEEE Internet of Things Journal. 9:14803-14817
With the advent of the Internet of Things (IoT), crowdsensing, as a new emerging application of the IoT that employs ubiquitous mobile users with smartphones for data collection and processing, has further deepened our knowledge. However, the problem
Publikováno v:
Mobile Information Systems, Vol 2021 (2021)
Blockchain technology has been widely used in many fields, such as smart cities, smart health care, and smart manufacturing, due to its anonymity, decentralization, and tamper resistance in peer-to-peer (P2P) networks. However, poor scalability has s
Publikováno v:
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
Publikováno v:
Computer Methods and Programs in Biomedicine. 232:107450
Publikováno v:
IEEE Transactions on Industrial Informatics. 16:4206-4218
With the popularization of intelligent terminals, especially current trends, such as “Industrie 4.0” and the Internet of Things, mobile crowdsensing is becoming one of the promising applications built on smart devices in mobile networks. However,
Publikováno v:
Computers, Materials & Continua. 65:1321-1334
In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or u