UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system Journal article
Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
Authors:  Guangxue Zhang;  Tian Wang;  Guojun Wang;  Anfeng Liu;  Weijia Jia
Favorite | TC[WOS]:67 TC[Scopus]:63  IF:1.5/1.5 | Submit date:2021/12/07
Fog Computing  Hidden Data Attacks  Internal Attacks  Sensor-cloud  Trust Evaluation Mechanism  
MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things Journal article
Wang, Tian, Luo, Hao, Jia, Weijia, Liu, Anfeng, Xie, Mande. MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2019, 16(3), 2054-2062.
Authors:  Wang, Tian;  Luo, Hao;  Jia, Weijia;  Liu, Anfeng;  Xie, Mande
Favorite | TC[WOS]:129 TC[Scopus]:163  IF:11.7/11.4 | Submit date:2021/12/06
Artificial Intelligence (Ai)  Edge Computing  Sensor-cloud  Smart Industrial Internet Of Things (Iot)  Trust Evaluation  
Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展 Journal article
Wang T., Zhang G., Cai S., Jia W., Wang G.. Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展[J]. Tongxin Xuebao/Journal on Communications, 2018, 39(6), 37-51.
Authors:  Wang T.;  Zhang G.;  Cai S.;  Jia W.;  Wang G.
Favorite | TC[Scopus]:10 | Submit date:2019/02/11
Fog Computing  Internal Attack  Sensor-cloud  Trust Evaluation Mechanism  
Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks Journal article
Peng S., Jia W., Wang G., Wu J., Guo M.. Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks[J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93-D(3), 510-517.
Authors:  Peng S.;  Jia W.;  Wang G.;  Wu J.;  Guo M.
Favorite | TC[WOS]:12 TC[Scopus]:16 | Submit date:2019/02/11
Collaborative Filtering  Mobile Ad-hoc Networks  Multiple Constraints  Trust Evaluation  Trusted Routing