Research on FDI Attacks in Edge Computing Environment
暂无分享,去创建一个
Qing Li | Yixin Jiang | Haojie Lin | Hong Wen | Yunan Zhang | Aidong Xu | Wenjing Hou | Zhongqi Mao | Yixin Jiang | Aidong Xu | Hong Wen | Yunan Zhang | Qing Li | Haojie Lin | Wenjing Hou | Zhongqi Mao
[1] Hong Wen,et al. Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers , 2018, IEEE Transactions on Vehicular Technology.
[2] Hong Wen,et al. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT) , 2015, IEEE Transactions on Emerging Topics in Computing.
[3] Zuyi Li,et al. False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.
[4] Lei Zhang,et al. Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks , 2014, IEEE Transactions on Communications.
[5] Bi Kai,et al. New feature selection approach by PCA and ReliefF , 2010 .
[6] Guang Gong,et al. Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..
[7] Hong Wen,et al. Physical layer assist authentication technique for smart meter system , 2013, IET Commun..
[8] Hong Wen,et al. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.
[9] Hong Wen,et al. Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.
[10] Peerapon Vateekul,et al. Enhancing accuracy of multi-label classification by applying one-vs-one support vector machine , 2016, 2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[11] Eklas Hossain,et al. Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review , 2019, IEEE Access.
[12] Hong Wen,et al. Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting , 2019, IEEE Access.
[13] Hong Wen,et al. Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.