Zobrazeno 1 - 10
of 139
pro vyhledávání: '"Zhijun Ding"'
Publikováno v:
IEEE Access, Vol 8, Pp 39285-39299 (2020)
In the microservice system, microservices are generally deployed as many microservice instances connected by a network system, and there are several composite services (CSs) in the system, each of which consists of several tasks that need to be execu
Externí odkaz:
https://doaj.org/article/d6c661cbfbfb4e8db7da482c1c78a786
Publikováno v:
IEEE Access, Vol 8, Pp 101035-101048 (2020)
E-commerce transaction systems have become an important factor in trading activities. However, e-commerce systems are still undergoing development. Unobservable actions and attacks on systems are frequent problems that increase the vulnerability of e
Externí odkaz:
https://doaj.org/article/822ee2a8dd1f4a53be3062b418bff726
Publikováno v:
IEEE Access, Vol 7, Pp 108703-108728 (2019)
With the rapid development of the Internet and the continuous progress of computer science and technology, Internet-based online trading has developed rapidly and improved the convenience of everyday life. Increasingly, people conduct business activi
Externí odkaz:
https://doaj.org/article/f1830e0a31d949f68e2b63c45a9bf30c
Autor:
Zhijun Ding, Min Ming
Publikováno v:
IEEE Access, Vol 7, Pp 131435-131447 (2019)
With the rapid development of the Internet and mobile technology, the frequency of online fraud incidents continues to increase, and the fraudulent means are increasingly diverse. Traditional anti-fraud methods can no longer effectively deal with the
Externí odkaz:
https://doaj.org/article/ebd6ac1aa7dd4530a7a4d5c72263bbc6
Autor:
Zhijun Ding, Ru Yang
Publikováno v:
IEEE Access, Vol 6, Pp 68038-68056 (2018)
Mobile computing systems have generated many concerns. Numerous studies have been performed to model and analyze these systems. This paper focuses on the existing modeling and corresponding analyses methods for mobile computing systems based on forma
Externí odkaz:
https://doaj.org/article/40859bc8183042a99a68ed2ba9f58371
Publikováno v:
IEEE Access, Vol 6, Pp 25100-25109 (2018)
In the behavior consistency analysis of E-commerce systems, sometimes there may appear loop structure between two E-commerce systems, which leads to the situation that internal behavior relation is consistent but external process of net is not. The e
Externí odkaz:
https://doaj.org/article/d40bd77b5a8e4994888ff5d0b589f072
Publikováno v:
IEEE Access, Vol 6, Pp 72402-72414 (2018)
Device fingerprinting has lately received great attention due to its effectiveness in fraud detection, secure authentication, and user tracking. Whereas fingerprinting performs well on labeled device data using classification methods, there are sever
Externí odkaz:
https://doaj.org/article/d85c88f62fd14710912432de8fbcc800
Publikováno v:
IEEE Access, Vol 4, Pp 5673-5686 (2016)
Due to a battery constraint in wireless sensor networks (WSNs), prolonging their lifetime is important. Energy-efficient routing techniques for WSNs play a great role in doing so. In this paper, we articulate this problem and classify current routing
Externí odkaz:
https://doaj.org/article/1374c3a0c32f4f81919acfe9e4f2d7a6
Autor:
Hao Zhang, Wenchen Nie, Xu Zhang, Gentang Zhang, Zhiqiang Li, Huaibing Wu, Qiong Shi, Yong Chen, Zhijun Ding, Xiuping Zhou, Rutong Yu
Publikováno v:
PLoS ONE, Vol 8, Iss 12, p e82789 (2013)
Neuronal precursor cell-expressed developmentally down-regulated 4-1 (NEDD4-1) plays a great role in tumor cell growth, but its function and mechanism in cell invasive behavior are totally unknown. Here we report that NEDD4-1 regulates migration and
Externí odkaz:
https://doaj.org/article/827150dd9627487783a4f5b89d3cbe3a
Publikováno v:
IEEE Transactions on Services Computing. 16:1184-1197