CASIA OpenIR

浏览/检索结果: 共4条,第1-4条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7650-7658
作者:  Cai, Xingjuan;  Geng, Shaojin;  Zhang, Jingbo;  Wu, Di;  Cui, Zhihua;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:226/0  |  提交时间:2021/12/28
Blockchain  Industrial Internet of Things  Throughput  Optimization  Scalability  Load modeling  Delays  Blockchain  industrial Internet of Things (IIoT)  many-objective optimization algorithm  privacy preservation  scalability  security  
A New Subspace Clustering Strategy for AI-Based Data Analysis in IoT System 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2021, 卷号: 8, 期号: 16, 页码: 12540-12549
作者:  Cui, Zhihua;  Jing, Xuechun;  Zhao, Peng;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:242/0  |  提交时间:2021/11/02
Sparse matrices  Internet of Things  Clustering algorithms  Correlation  Artificial intelligence  Servers  Hyperspectral imaging  Close neighbors  data analysis  hyperspectral images (HSIs)  Internet of Things (IoT)  subspace clustering  
Pedestrian Trajectory Prediction Based on Deep Convolutional LSTM Network 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 卷号: 22, 期号: 6, 页码: 3285-3302
作者:  Song, Xiao;  Chen, Kai;  Li, Xu;  Sun, Jinghan;  Hou, Baocun;  Cui, Yong;  Zhang, Baochang;  Xiong, Gang;  Wang, Zilie
收藏  |  浏览/下载:282/0  |  提交时间:2021/08/15
Trajectory  Predictive models  Neural networks  Force  Mathematical model  Feature extraction  Tensors  Pedestrian behavior  convolution  long short-term memory  neural network  
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:  Zhang, Zhixia;  Cao, Yang;  Cui, Zhihua;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:243/0  |  提交时间:2021/08/15
Intrusion detection  Security  6G mobile communication  Data models  Protocols  Optimization  Encryption  Controller area network (CAN)  intrusion detection  machine learning (ML)  many-objective optimization  vehicular networks security