相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An Approach to Alleviate the Sparsity Problem of Hybrid Collaborative Filtering Based Recommendations: The Product-Attribute Perspective from User Reviews
Xiaoxian Yang et al.
MOBILE NETWORKS & APPLICATIONS (2020)
QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment
Yuyu Yin et al.
MOBILE NETWORKS & APPLICATIONS (2020)
Dynamical Resource Allocation in Edge for Trustable Internet-of-Things Systems: A Reinforcement Learning Method
Shuiguang Deng et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Energy Efficient Routing Algorithm with Mobile Sink Support for Wireless Sensor Networks
Jin Wang et al.
SENSORS (2019)
An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks
Jin Wang et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks
Jin Wang et al.
JOURNAL OF SUPERCOMPUTING (2018)
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing
Jun Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Dynamic cloud resource management for efficient media applications in mobile computing environments
Gangyong Jia et al.
PERSONAL AND UBIQUITOUS COMPUTING (2018)
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning
Jun Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Model checking concurrent systems with MSVL
Nan Zhang et al.
SCIENCE CHINA-INFORMATION SCIENCES (2016)
Efficient and secure DNS cyber shelter on DDoS attacks
Sunghyuck Hong
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2015)
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
Shui Yu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
Influence of Mn content and hot deformation on transformation behavior of C-Mn steels
Li Long et al.
JOURNAL OF IRON AND STEEL RESEARCH INTERNATIONAL (2008)
Survey of network-based defense mechanisms countering the DoS and DDoS problems
Tao Peng et al.
ACM COMPUTING SURVEYS (2007)
Defense against spoofed IP traffic using hop-count filtering
Haining Wang et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2007)
StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense
Abraham Yaar et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)
An analysis of using reflectors for distributed denial-of-service attacks
V Paxson
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2001)