登录    注册    忘记密码

沈士根 收藏

导出分析报告

被引量:2,118H指数:26SCI-EXPANDED: 59 EI: 71 北大核心: 21 CSCD: 14

-

检索结果分析

结果分析中...
排序方式:

196 条 记 录,以下是 1-30

题名 作者 出处 被引量 操作
Constructing dummy query sequences to protect location privacy and query privacy in location-based servicesWu, Zongda[1];Li, Guiling[2,3]WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS168
Multi-population techniques in nature inspired optimization algorithms: A comprehensive surveyMa, Haiping[1];Shen, Shigen[1]SWARM AND EVOLUTIONARY COMPUTATION139
A dummy-based user privacy protection approach for text information retrievalWu, Zongda[1,3];Shen, Shigen[1KNOWLEDGE-BASED SYSTEMS134
An effective approach for the protection of user commodity viewing privacy in e-commerce websiteWu, Zongda[1];Shen, Shigen[1];KNOWLEDGE-BASED SYSTEMS132
Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT InfrastructuresCui, Lei[1,2];Qu, Youyang[3];XIEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS86
Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT NetworksShen, Shigen[1];Huang, LongjunIEEE INTERNET OF THINGS JOURNAL86
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor NetworksShen, Shigen[1,2];Li, Hongjie[IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY69
A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropyHu, Keli[1];Ye, Jun[1];Fan, EnJOURNAL OF INTELLIGENT & FUZZY SYSTEMS62
Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid AttacksCheng, Zihao[1];Hu, Songlin[2]IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS58
MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG SignalsDai, Yuanchao[1];Wu, Jing[2];FACM TRANSACTIONS ON SENSOR NETWORKS52
A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge CloudLiu, Jianhua[1];Wang, Xin[2];SIEEE INTERNET OF THINGS JOURNAL51
Popularity-Aware and Diverse Web APIs Recommendation Based on Correlation GraphWu, Shengqi[1];Shen, Shigen[2]IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS51
Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoTWu, Guowen[1];Xu, Zhiqi[1];ZhaJOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING43
Time-Aware Missing Healthcare Data Prediction Based on ARIMA ModelKong, Lingzhen[1];Li, GuangshuIEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS42
A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-CloudLiu, Jianhua[1];Shen, Shigen[1APPLIED SOFT COMPUTING38
A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy ProtectionWu, Zongda[1];Shen, Shigen[2];JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING36
Malware propagation model in wireless sensor networks under attack-defense confrontationZhou, Haiping[1];Shen, Shigen[COMPUTER COMMUNICATIONS36
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-CloudsLiu, Jianhua[1,2,3];Yu, Jiadi[IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY34
FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin NetworksQu, Youyang[1];Gao, Longxiang[IEEE NETWORK32
HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNsShen, Shigen[1];Zhou, Haiping[JOURNAL OF NETWORK AND COMPUTER APPLICATIONS32
Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge CloudLiu, Jianhua[1];Wang, Xin[2];SIEEE INTERNET OF THINGS JOURNAL31
FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow PredictionDuan, Youxiang[1,2];Chen, NingIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY31
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusionShen, Shigen[1];Ma, Haiping[2]JOURNAL OF NETWORK AND COMPUTER APPLICATIONS31
Signaling game-based availability assessment for edge computing-assisted IoT systems with malware disseminationShen, Yizhou[1,2];Shen, ShigenJOURNAL OF INFORMATION SECURITY AND APPLICATIONS31
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of ThingsWu, Guowen[1];Xie, Lanlan[1];ZJOURNAL OF NETWORK AND COMPUTER APPLICATIONS30
Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie AlgebraCheng, Zihao[1];Yue, Dong[2];SIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY27
Incorporating Distributed DRL Into Storage Resource Optimization of Space-Air-Ground Integrated Wireless Communication NetworkWang, Chao[1];Liu, Lei[2,3];JiIEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING26
Data sharing in VANETs based on evolutionary fuzzy gameLiu, Jianhua[1,3];Wang, Xin[2]FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE25
SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor NetworksShen, Shigen[1];Zhou, Haiping[IEEE ACCESS24
Reliability Evaluation for Clustered WSNs under Malware PropagationShen, Shigen[1,2];Huang, LongjSENSORS22
已选条目 检索报告 聚类工具

版权所有©绍兴文理学院 重庆维普资讯有限公司 渝B2-20050021-8
渝公网安备 50019002500408号 违法和不良信息举报中心