Search

Your search keyword '"Maode Ma"' showing total 1,123 results

Search Constraints

Start Over You searched for: Author "Maode Ma" Remove constraint Author: "Maode Ma"
1,123 results on '"Maode Ma"'

Search Results

1. Routing protocols strategies for flying Ad-Hoc network (FANET): Review, taxonomy, and open research issues

2. A literature review on V2X communications security: Foundation, solutions, status, and future

3. Secure federated distillation GAN for CIDS in industrial CPS

4. Minimizing energy consumption of IoT devices for O-RAN based IoT systems

5. EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V

6. A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

7. A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks

8. Enhanced Beidou user equipment access authentication protocol based on location key

9. Federated Learning with Efficient Aggregation via Markov Decision Process in Edge Networks

10. Risk Assessment Edge Contract for Efficient Resource Allocation

11. ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things

12. IEEE Access Special Section Editorial: Urban Computing and Intelligence

13. Ieee Access Special Section Editorial: Human-Driven Edge Computing

14. An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids

15. Secure Vehicular Platoon Management against Sybil Attacks

16. Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory

17. ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks

18. Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics

19. DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET

20. A Hybrid Authentication Protocol for LTE/LTE-A Network

21. Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol

22. A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

23. A Novel Mechanism for Fast Detection of Transformed Data Leakage

24. Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination

25. The Influence of MAC Protocol on a Non-Synchronous Localization Scheme in Large-Scale UWSNs

26. Utility-Optimized Flow-Level Bandwidth Allocation in Hybrid SDNs

27. Distributed Power Saving for Large-Scale Software-Defined Data Center Networks

29. A Novel Efficient Address Mutation Scheme for IPv6 Networks

30. An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space

31. Multi-Population Ant Colony Algorithm for Virtual Machine Deployment

32. Parameterized Spatio-Textual Publish/Subscribe in Road Sensor Networks

33. Advanced Perceptive Forwarding in Content-Centric Networks

34. $\text{E}^{3}$ MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks

35. Maximum-Likelihood Estimator of Clock Offset between Nanomachines in Bionanosensor Networks

36. A Special Section in IEEE Access: Cooperative and Intelligent Sensing

37. CCS-DTN: Clustering and Network Coding-Based Efficient Routing in Social DTNs

38. A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks

39. Minimum Connected Dominating Set Algorithms for Ad Hoc Sensor Networks

40. Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks

42. TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs

43. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing

Catalog

Books, media, physical & digital resources