Showing results 3 to 22 of 348
< previous
next >
Issue Date | Title | Author(s) |
2022-01-01 | A Community Detection-Based Blockchain Sharding Scheme | Zhang, Z; Wang, X; Yu, G; Ni, W; Liu, RP; Georgalas, N; Reeves, A |
2019-01-01 | A comprehensive security framework for publish/subscribe-based IoT services communication | Duan, L; Sun, CA; Zhang, Y; Ni, W; Chen, J |
2023-06-01 | A comprehensive survey on applications of AI technologies to failure analysis of industrial systems | Bi, S; Wang, C; Wu, B; Hu, S; Huang, W; Ni, W; Gong, Y; Wang, X |
2021-03-01 | A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications | Thomas, D; Orgun, M; Hitchens, M; Shankaran, R; Mukhopadhyay, SC; Ni, W |
2019-01-01 | A High-Performance Hybrid Blockchain System for Traceable IoT Applications | Wang, X; Yu, P; Yu, G; Zha, X; Ni, W; Liu, RP; Guo, YJ |
2021-12-01 | A hybrid intelligent service recommendation by latent semantics and explicit ratings | Duan, L; Gao, T; Ni, W; Wang, W |
2020-06-04 | A Method for Covert Video Surveillance of a Car or a Pedestrian by an Autonomous Aerial Drone via Trajectory Planning | Huang, H; Savkin, AV; Ni, W |
2023-07-01 | A new concatenated Multigraph Neural Network for IoT intrusion detection | Altaf, T; Wang, X; Ni, W; Yu, G; Liu, RP; Braun, R |
2021-05-01 | A novel Dual-Blockchained structure for contract-theoretic LoRa-based information systems | Yu, G; Zhang, L; Wang, X; Yu, K; Ni, W; Zhang, JA; Liu, RP |
2023-01-01 | A Novel RFID Localization Approach to Smart Self-Service Borrowing and Returning System | Bi, S; Wang, C; Shen, J; Xiang, W; Ni, W; Wang, X; Wu, B; Gong, Y |
2022-11-09 | A sub-action aided deep reinforcement learning framework for latency-sensitive network slicing | Xiao, D; Chen, S; Ni, W; Zhang, J; Zhang, A; Liu, R |
2023-12-01 | A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks | Xiao, D; Zhang, JA; Liu, X; Qu, Y; Ni, W; Liu, RP |
2020-09-01 | A Unified Analytical model for proof-of-X schemes | Yu, G; Zha, X; Wang, X; Ni, W; Yu, K; Zhang, JA; Liu, RP |
2017-11-14 | AC-PROT: An Access Control Model to Improve Software-Defined Networking Security | Wu, W; Liu, R; Ni, W; Kaafar, D; Huang, X |
2017-05-15 | Achieving enhanced hydrophobicity of graphene membranes by covalent modification with polydimethylsiloxane | Lei, WW; Li, H; Shi, LY; Diao, YF; Zhang, YL; Ran, R; Ni, W |
2020 | Achieving Ultra-Reliable and Low Latency Communications in IoT by FD-SCMA | Zeng, J; Lv, T; Lin, Z; Liu, RP; Mei, J; Ni, W; Guo, YJ |
2022-12-01 | Achieving URLLC by MU-MIMO With Imperfect CSI: Under κ-μ Shadowed Fading | Zeng, J; Xu, Q; Fan, X; Ye, N; Ni, W; Jay Guo, Y |
2017-09-01 | Adaptive Centralized Clustering Framework for Software-Defined Ultra-Dense Wireless Networks | Lyu, X; Tian, H; Ni, W; Liu, RP; Zhang, P |
2023-11-01 | Adaptive Resource Scheduling in Permissionless Sharded-Blockchains: A Decentralized Multiagent Deep Reinforcement Learning Approach | Yu, G; Wang, X; Ni, W; Lu, Q; Xu, X; Liu, RP; Zhu, L |
2022-01-01 | AI-Driven Energy-Efficient Content Task Offloading in Cloud-Edge-End Cooperation Networks | Fang, C; Meng, X; Hu, Z; Xu, F; Zeng, D; Dong, M; Ni, W |