A method of chained recommendation for charging piles in internet of vehicles
暂无分享,去创建一个
[1] Lai Tu,et al. Understanding operational and charging patterns of Electric Vehicle taxis using GPS records , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[2] Tianle Zhang,et al. Realistic Traffic Data Based Mobility Modeling and Simulation of Smart EV , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[3] Xianfu Chen,et al. Age of Information Aware Radio Resource Management in Vehicular Networks: A Proactive Deep Reinforcement Learning Perspective , 2019, IEEE Transactions on Wireless Communications.
[4] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[5] Mohsen Guizani,et al. Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.
[6] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[7] Feng Jiang,et al. A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices , 2018, Wirel. Commun. Mob. Comput..
[8] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[9] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[10] Yusheng Ji,et al. AVE: Autonomous Vehicular Edge Computing Framework with ACO-Based Scheduling , 2017, IEEE Transactions on Vehicular Technology.
[11] Mohsen Guizani,et al. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[12] Shen Su,et al. Automatically Traceback RDP-Based Targeted Ransomware Attacks , 2018, Wirel. Commun. Mob. Comput..
[13] Ming Zhu,et al. The charging-scheduling problem for electric vehicle networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Camino R. Vela,et al. Electric Vehicle Charging Scheduling by an Enhanced Artificial Bee Colony Algorithm , 2018, Energies.
[15] Yan Jia,et al. Bidirectional self-adaptive resampling in internet of things big data learning , 2018, Multimedia Tools and Applications.
[16] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[17] Xiaojiang Du,et al. Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[18] Mohan Li,et al. Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.
[19] Binxing Fang,et al. A Survey on Access Control in the Age of Internet of Things , 2020, IEEE Internet of Things Journal.
[20] C. Rehtanz,et al. Large-Scale Modeling of Grid-Connected Electric Vehicles , 2013, IEEE Transactions on Power Delivery.
[21] Tat-Seng Chua,et al. Neural Collaborative Filtering , 2017, WWW.
[22] Yu Jiang,et al. Time series behavior modeling with digital twin for Internet of Vehicles , 2019, EURASIP J. Wirel. Commun. Netw..
[23] Shen Su,et al. A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection , 2019, Applied Sciences.
[24] Mohsen Guizani,et al. A data-driven method for future Internet route decision modeling , 2019, Future Gener. Comput. Syst..
[25] Shen Su,et al. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.
[26] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[27] Jinqiao Shi,et al. Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.
[28] Hua Qin,et al. Charging scheduling with minimal waiting in a network of electric vehicles and charging stations , 2011, VANET '11.
[29] Mohsen Guizani,et al. Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks , 2018, IEEE Journal on Selected Areas in Communications.
[30] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[31] Xiaojiang Du,et al. Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[32] Yusheng Ji,et al. Mobile Edge Computing for the Internet of Vehicles: Offloading Framework and Job Scheduling , 2019, IEEE Vehicular Technology Magazine.
[33] Mohsen Guizani,et al. Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory , 2019, IEEE Transactions on Vehicular Technology.
[34] Dongwen Zhang,et al. Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.
[35] Lai Tu,et al. Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis , 2016, IEEE Transactions on Intelligent Transportation Systems.
[36] P. Castoldi,et al. Designing and Evaluating Activity-Based Electric Vehicle Charging in Urban Areas , 2013, 2013 IEEE International Electric Vehicle Conference (IEVC).
[37] Joseph Ying Jun Chow,et al. Stochastic Dynamic Itinerary Interception Refueling Location Problem with Queue Delay for Electric Taxi Charging Stations , 2014 .
[38] Xiaojiang Du,et al. Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.
[39] Matthew J. Rutherford,et al. The impact of Electric Vehicle battery charging on distribution transformers , 2011, 2011 Twenty-Sixth Annual IEEE Applied Power Electronics Conference and Exposition (APEC).
[40] Yusheng Ji,et al. Spatial Intelligence toward Trustworthy Vehicular IoT , 2018, IEEE Communications Magazine.
[41] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[42] Shen Su,et al. Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..
[43] Christian Rehtanz,et al. Testing environment for Vehicle to Grid (V2G) applications for investigating a voltage stability support method , 2014, 2014 IEEE Transportation Electrification Conference and Expo (ITEC).