UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Cooperative Control of Air-ground Swarms Under DoS Attack via Cloud-Fog Computing Journal article
Li, Jiacheng, Yu, Dengxiu, Ma, Wenhui, Liu, Jason J.R., Liu, Yan Jun. Cooperative Control of Air-ground Swarms Under DoS Attack via Cloud-Fog Computing[J]. IEEE Transactions on Network Science and Engineering, 2024, 11(5), 4278-4292.
Authors:  Li, Jiacheng;  Yu, Dengxiu;  Ma, Wenhui;  Liu, Jason J.R.;  Liu, Yan Jun
Favorite | TC[WOS]:1 TC[Scopus]:2  IF:6.7/6.0 | Submit date:2024/07/04
Air-ground Swarm  Dos Attacks  Cloud-fog Computing  Cooperative Control  Heterogeneous  Event-triggered Strategy  
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system Journal article
Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
Authors:  Guangxue Zhang;  Tian Wang;  Guojun Wang;  Anfeng Liu;  Weijia Jia
Favorite | TC[WOS]:68 TC[Scopus]:65  IF:1.5/1.5 | Submit date:2021/12/07
Fog Computing  Hidden Data Attacks  Internal Attacks  Sensor-cloud  Trust Evaluation Mechanism  
A novel trust mechanism based on Fog Computing in Sensor–Cloud System Journal article
Wang, Tian, Zhang, Guangxue, Bhuiyan, MD Zakirul Alam, Liu, Anfeng, Jia, Weijia, Xie, Mande. A novel trust mechanism based on Fog Computing in Sensor–Cloud System[J]. Future Generation Computer Systems, 2020, 109, 573-582.
Authors:  Wang, Tian;  Zhang, Guangxue;  Bhuiyan, MD Zakirul Alam;  Liu, Anfeng;  Jia, Weijia; et al.
Favorite | TC[WOS]:115 TC[Scopus]:118  IF:6.2/5.9 | Submit date:2021/12/06
Edge Node  Fog Computing  Misjudgment Node  Sensor–cloud  Trust Mechanism  
Secure Data Query Framework for Cloud and Fog Computing Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:70 TC[Scopus]:70  IF:4.7/4.6 | Submit date:2021/12/06
Cloud Computing  Data Query  Fog Computing  Security  
Fog-based computing and storage offloading for data synchronization in IoT Journal article
Wang, Tian, Zhou, Jiyuan, Liu, Anfeng, Bhuiyan, Md Zakirul Alam, Wang, Guojun, Jia, Weijia. Fog-based computing and storage offloading for data synchronization in IoT[J]. IEEE Internet of Things Journal, 2019, 6(3), 4272-4282.
Authors:  Wang, Tian;  Zhou, Jiyuan;  Liu, Anfeng;  Bhuiyan, Md Zakirul Alam;  Wang, Guojun; et al.
Favorite | TC[WOS]:141 TC[Scopus]:152  IF:8.2/9.0 | Submit date:2022/05/17
Cloud Computing  Cloud Storage  Computing Offloading  Differential Synchronization  Fog Computing  
Coupling resource management based on fog computing in smart city systems Journal article
Wang, Tian, Liang, Yuzhu, Jia, Weijia, Arif, Muhammad, Liu, Anfeng, Xie, Mande. Coupling resource management based on fog computing in smart city systems[J]. Journal of Network and Computer Applications, 2019, 135, 11-19.
Authors:  Wang, Tian;  Liang, Yuzhu;  Jia, Weijia;  Arif, Muhammad;  Liu, Anfeng; et al.
Favorite | TC[WOS]:77 TC[Scopus]:99  IF:7.7/6.8 | Submit date:2022/05/17
Cloud Computing  Fog Computing  Sensor-cloud  Smart City  
Research progress of trusted sensor-cloud based on fog computing 基于雾计算的可信传感云研究进展 Review article
2019
Authors:  Wang, Tian;  Shen, Xuewei;  Luo, Hao;  Chen, Baisheng;  Wang, Guojun; et al.
Favorite | TC[Scopus]:12 | Submit date:2022/04/15
Sensor-cloud  Wsn  Trusted Cloud Computing  Fog Computing  
Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展 Journal article
Wang T., Zhang G., Cai S., Jia W., Wang G.. Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展[J]. Tongxin Xuebao/Journal on Communications, 2018, 39(6), 37-51.
Authors:  Wang T.;  Zhang G.;  Cai S.;  Jia W.;  Wang G.
Favorite | TC[Scopus]:10 | Submit date:2019/02/11
Fog Computing  Internal Attack  Sensor-cloud  Trust Evaluation Mechanism