Issue Date | Title | Author(s) |
2017-10-01 | Collaborative Authentication in Decentralized Dense Mobile Networks with Key Predistribution | Zha, X; Ni, W; Zheng, K; Liu, RP; Niu, X |
2019 | Game Theoretic Suppression of Forged Messages in Online Social Networks | Wang, X; Zha, X; Ni, W; Liu, RP; Guo, YJ; Niu, X; Zheng, K |
2017-07-01 | Analytic model on data security in VANETs | Zha, X; Wang, X; Ni, W; Liu, RP; Guo, YJ; Niu, X; Zheng, K |
2018-09-01 | The impact of link duration on the integrity of distributed mobile networks | Zha, X; Ni, W; Wang, X; Liu, RP; Guo, YJ; Niu, X; Zheng, K |
2019-12 | Capacity of blockchain based Internet-of-Things: Testbed and analysis | Wang, X; Yu, G; Zha, X; Ni, W; Liu, RP; Guo, YJ; Zheng, K; Niu, X |
2022-01-01 | A newly combination model based on data denoising strategy and advanced optimization algorithm for short-term wind speed prediction | Lv, M; Wang, J; Niu, X; Lu, H |
2019-02-01 | Survey on blockchain for Internet of Things | Wang, X; Zha, X; Ni, W; Liu, RP; Guo, YJ; Niu, X; Zheng, K |
2016-07-12 | Detection of command and control in advanced persistent threat based on independent access | Wang, X; Zheng, K; Niu, X; Wu, B; Wu, C |
2015-01-01 | Secure data transmission and modelling in vehicular ad hoc networks | Zha, X; Ni, W; Liu, RP; Zheng, K; Niu, X |
2017-01-01 | Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection | Xu, Y; Wu, C; Zheng, K; Wang, X; Niu, X; Lu, T |