NUK - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 3,534
1.
  • Serving at the Edge: A Scal... Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing
    Ren, Ju; Guo, Hui; Xu, Chugui ... IEEE network, 01/2017, Volume: 31, Issue: 5
    Journal Article
    Peer reviewed

    By moving service provisioning from the cloud to the edge, edge computing becomes a promising solution in the era of IoT to meet the delay requirements of IoT applications, enhance the scalability ...
Full text
2.
  • Dynamic Channel Access to I... Dynamic Channel Access to Improve Energy Efficiency in Cognitive Radio Sensor Networks
    Ren, Ju; Zhang, Yaoxue; Zhang, Ning ... IEEE transactions on wireless communications 15, Issue: 5
    Journal Article
    Peer reviewed

    Wireless sensor networks operating in the license-free spectrum suffer from uncontrolled interference as those spectrum bands become increasingly crowded. The emerging cognitive radio sensor networks ...
Full text
3.
  • DPPro: Differentially Priva... DPPro: Differentially Private High-Dimensional Data Release via Random Projection
    Xu, Chugui; Ren, Ju; Zhang, Yaoxue ... IEEE transactions on information forensics and security, 12/2017, Volume: 12, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    Releasing representative data sets without compromising the data privacy has attracted increasing attention from the database community in recent years. Differential privacy is an influential privacy ...
Full text

PDF
4.
  • Synergy of Big Data and 5G ... Synergy of Big Data and 5G Wireless Networks: Opportunities, Approaches, and Challenges
    Zhang, Ning; Yang, Peng; Ren, Ju ... IEEE wireless communications, 2018-February, 2018-2-00, Volume: 25, Issue: 1
    Journal Article
    Peer reviewed

    This article presents the synergistic and complementary features of big data and 5G wireless networks. An overview of their interplay is provided first, including big-data-driven networking and big ...
Full text
5.
  • A Trusted Routing Scheme Us... A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks
    Yang, Jidian; He, Shiwen; Xu, Yang ... Sensors (Basel, Switzerland), 02/2019, Volume: 19, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    A trusted routing scheme is very important to ensure the routing security and efficiency of wireless sensor networks (WSNs). There are a lot of studies on improving the trustworthiness between ...
Full text

PDF
6.
  • GANobfuscator: Mitigating I... GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy
    Xu, Chugui; Ren, Ju; Zhang, Deyu ... IEEE transactions on information forensics and security, 09/2019, Volume: 14, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    By learning generative models of semantic-rich data distributions from samples, generative adversarial network (GAN) has recently attracted intensive research interests due to its excellent empirical ...
Full text
7.
  • Meta-analysis of the associ... Meta-analysis of the association between the inflammatory potential of diet and urologic cancer risk
    Lu, Dong-Liang; Ren, Zheng-Ju; Zhang, Qin ... PloS one, 10/2018, Volume: 13, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    The inflammatory potential of diet has been shown to have an association with the risk of several cancer types, but the evidence is inconsistent regarding the related risk of urologic cancer (UC). ...
Full text

PDF
8.
  • Blockchain Empowered Arbitr... Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service
    Xu, Yang; Ren, Ju; Zhang, Yan ... IEEE transactions on services computing, 03/2020, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed

    The maturity of network storage technology drives users to outsource local data to remote servers. Since these servers are not reliable enough for keeping users' data, remote data auditing mechanisms ...
Full text
9.
  • Adaptive and Channel-Aware ... Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
    Ren, Ju; Zhang, Yaoxue; Zhang, Kuan ... IEEE transactions on wireless communications 15, Issue: 5
    Journal Article
    Peer reviewed

    Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that can maliciously drop a subset of forwarding packets to degrade network performance and jeopardize the information ...
Full text
10.
  • A Blockchain-Based Nonrepud... A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT
    Xu, Yang; Ren, Ju; Wang, Guojun ... IEEE transactions on industrial informatics, 06/2019, Volume: 15, Issue: 6
    Journal Article

    Emerging network computing technologies extend the functionalities of industrial IoT (IIoT) terminals. However, this promising service-provisioning scheme encounters problems in untrusted and ...
Full text
1 2 3 4 5
hits: 3,534

Load filters