UM

Browse/Search Results:  1-10 of 19 Help

Selected(0)Clear Items/Page:    Sort:
Cooperative Control of Air-ground Swarms Under DoS Attack via Cloud-Fog Computing Journal article
Li, Jiacheng, Yu, Dengxiu, Ma, Wenhui, Liu, Jason J.R., Liu, Yan Jun. Cooperative Control of Air-ground Swarms Under DoS Attack via Cloud-Fog Computing[J]. IEEE Transactions on Network Science and Engineering, 2024, 11(5), 4278-4292.
Authors:  Li, Jiacheng;  Yu, Dengxiu;  Ma, Wenhui;  Liu, Jason J.R.;  Liu, Yan Jun
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:6.7/6.0 | Submit date:2024/07/04
Air-ground Swarm  Dos Attacks  Cloud-fog Computing  Cooperative Control  Heterogeneous  Event-triggered Strategy  
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs Journal article
Gu, Ke, Dong, Xin Ying, Jia, Wei Jia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2), 1215-1232.
Authors:  Gu, Ke;  Dong, Xin Ying;  Jia, Wei Jia
Favorite | TC[WOS]:29 TC[Scopus]:28  IF:5.3/4.6 | Submit date:2022/08/05
Data Security  Fog Computing  Malicious Node  Reputation  Vanets  
Secure Data Sequence Query Framework Based on Multiple Fogs Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Sequence Query Framework Based on Multiple Fogs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(4), 1883-1900.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:18 TC[Scopus]:20  IF:5.1/4.5 | Submit date:2022/05/13
Data Sequence Query  Fog Computing  Merkle Hashing Tree  Security  
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system Journal article
Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system[J]. Concurrency and Computation: Practice and Experience, 2021, 33(7).
Authors:  Guangxue Zhang;  Tian Wang;  Guojun Wang;  Anfeng Liu;  Weijia Jia
Favorite | TC[WOS]:67 TC[Scopus]:63  IF:1.5/1.5 | Submit date:2021/12/07
Fog Computing  Hidden Data Attacks  Internal Attacks  Sensor-cloud  Trust Evaluation Mechanism  
Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism Journal article
Gu, Ke, Tang, Linyu, Jiang, Jiafu, Jia, Wei Jia. Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism[J]. IEEE Transactions on Computational Social Systems, 2020, 7(5), 1246-1263.
Authors:  Gu, Ke;  Tang, Linyu;  Jiang, Jiafu;  Jia, Wei Jia
Favorite | TC[WOS]:10 TC[Scopus]:13  IF:4.5/4.6 | Submit date:2021/12/06
Community  Fog Computing  Reputation  Resource Allocation  Security  
Mobile Vehicles as Fog Nodes for Latency Optimization in Smart Cities Journal article
Chaogang Tang, Xianglin Wei, Chunsheng Zhu, Yi Wang, Weijia Jia. Mobile Vehicles as Fog Nodes for Latency Optimization in Smart Cities[J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69(9), 9364-9375.
Authors:  Chaogang Tang;  Xianglin Wei;  Chunsheng Zhu;  Yi Wang;  Weijia Jia
Favorite | TC[WOS]:76 TC[Scopus]:95  IF:6.1/6.5 | Submit date:2021/12/06
Greedy Heuristic  Offloading  Strategy  Task Scheduling  Vehicular Fog Computing  
A novel trust mechanism based on Fog Computing in Sensor–Cloud System Journal article
Wang, Tian, Zhang, Guangxue, Bhuiyan, MD Zakirul Alam, Liu, Anfeng, Jia, Weijia, Xie, Mande. A novel trust mechanism based on Fog Computing in Sensor–Cloud System[J]. Future Generation Computer Systems, 2020, 109, 573-582.
Authors:  Wang, Tian;  Zhang, Guangxue;  Bhuiyan, MD Zakirul Alam;  Liu, Anfeng;  Jia, Weijia; et al.
Favorite | TC[WOS]:113 TC[Scopus]:114  IF:6.2/5.9 | Submit date:2021/12/06
Edge Node  Fog Computing  Misjudgment Node  Sensor–cloud  Trust Mechanism  
UAV Placement Optimization for Internet of Medical Things Conference paper
Tang, Chaogang, Zhu, Chunsheng, Wei, Xianglin, Rodrigues, Joel J.P.C., Guizani, Mohsen, Jia, Weijia. UAV Placement Optimization for Internet of Medical Things[C], 2020, 752-757.
Authors:  Tang, Chaogang;  Zhu, Chunsheng;  Wei, Xianglin;  Rodrigues, Joel J.P.C.;  Guizani, Mohsen; et al.
Favorite | TC[Scopus]:9 | Submit date:2021/12/06
Airborne Fog Computing  Health  Iomt  Placement  Uav  
Swarm Decision Table and Ensemble Search Methods in Fog Computing Environment: Case of Day-Ahead Prediction of Building Energy Demands Using IoT Sensors Journal article
Tengyue Li, Simon Fong, Xuqi Li, Zhihui Lu, Amir H. Gandomi. Swarm Decision Table and Ensemble Search Methods in Fog Computing Environment: Case of Day-Ahead Prediction of Building Energy Demands Using IoT Sensors[J]. IEEE Internet of Things Journal, 2020, 7(3), 2321-2342.
Authors:  Tengyue Li;  Simon Fong;  Xuqi Li;  Zhihui Lu;  Amir H. Gandomi
Favorite | TC[WOS]:13 TC[Scopus]:18  IF:8.2/9.0 | Submit date:2021/03/09
Data Analytics  Data Stream Mining  Fog Computing  Internet Of Things (Iot)  Swarm Decision Table (Sdt)  Smart Home  
Secure Data Query Framework for Cloud and Fog Computing Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:69 TC[Scopus]:68  IF:4.7/4.6 | Submit date:2021/12/06
Cloud Computing  Data Query  Fog Computing  Security