-
1
المؤلفون: Guangtao Xue, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Jiadi Yu
المصدر: IEEE Transactions on Mobile Computing. 22:2789-2801
مصطلحات موضوعية: Computer Networks and Communications, Electrical and Electronic Engineering, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::644e1f6123983bede870a4cd9a997335Test
https://doi.org/10.1109/tmc.2021.3133481Test -
2
المؤلفون: Fei Teng, Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu
المصدر: ACM Transactions on Sensor Networks. 19:1-21
مصطلحات موضوعية: Computer Networks and Communications
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::c8c45647e5c27af141775621533df96aTest
https://doi.org/10.1145/3585314Test -
3
المؤلفون: Guangtao Xue, Yijie Li, Hao Pan, Lanqing Yang, Yi-Chao Chen, Xiaoyu Ji, Jiadi Yu
المصدر: IEEE/ACM Transactions on Networking. 31:862-876
مصطلحات موضوعية: Computer Networks and Communications, Electrical and Electronic Engineering, Software, Computer Science Applications
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8f36b55e331009665fa6331bda51f18fTest
https://doi.org/10.1109/tnet.2022.3203044Test -
4
المؤلفون: Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yichao Chen, Gang Qu, Wenyuan Xu
المصدر: IEEE Transactions on Mobile Computing. :1-18
مصطلحات موضوعية: Computer Networks and Communications, Electrical and Electronic Engineering, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::43787b3b3fd4249e4cda6ed10046ad62Test
https://doi.org/10.1109/tmc.2023.3262400Test -
5
المؤلفون: Chen Yan, Jiangyi Deng, Xiaoyu Ji, Wenyuan Xu, Xinyan Zhou
المصدر: IEEE Transactions on Mobile Computing. 21:1155-1171
مصطلحات موضوعية: Authentication, Face-to-face, Computer Networks and Communications, business.industry, Computer science, Electrical and Electronic Engineering, business, Mobile device, Software, Computer network
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::729e6f41307382c8a884a4a139bb87a0Test
https://doi.org/10.1109/tmc.2020.3025023Test -
6
المؤلفون: Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu
المصدر: IEEE Transactions on Information Forensics and Security. 17:1528-1543
مصطلحات موضوعية: Computer Networks and Communications, Safety, Risk, Reliability and Quality
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::bd3319ba222e2a8bdc2514a2d0e9c320Test
https://doi.org/10.1109/tifs.2022.3163583Test -
7
المؤلفون: Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen
المصدر: ACM Transactions on Sensor Networks. 18:1-28
مصطلحات موضوعية: Computer Networks and Communications
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::26b0a9798caea7dffd2cdae4791461d4Test
https://doi.org/10.1145/3495158Test -
8
المؤلفون: Bin Wang, Wenyuan Xu, Chaohao Li, Xiaoyu Ji, Wang Kai
المصدر: ACM Transactions on Sensor Networks. 17:1-22
مصطلحات موضوعية: Scheme (programming language), 021110 strategic, defence & security studies, Modalities, Exploit, Computer Networks and Communications, Computer science, Real-time computing, 0211 other engineering and technologies, Word error rate, 020206 networking & telecommunications, Context (language use), 02 engineering and technology, 0202 electrical engineering, electronic engineering, information engineering, Entropy (information theory), computer, Mobile device, Wireless sensor network, computer.programming_language
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::66bcf60a55b5b44029fa093f2d4c1e20Test
https://doi.org/10.1145/3449071Test -
9
المؤلفون: Taimin Zhang, Xiaoyu Ji, Wenyuan Xu
المصدر: Mobile Networks and Applications. 27:329-342
مصطلحات موضوعية: Computer Networks and Communications, Hardware and Architecture, Software, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::714d01a49844b8a3d3a47164abde68fcTest
https://doi.org/10.1007/s11036-020-01634-zTest -
10
المؤلفون: Juchuan Zhang, Wenyuan Xu, Chaohao Li, Yanmiao Zhang, Xiaoyu Ji, Xinyan Zhou
المصدر: ACM Transactions on Internet of Things. 1:1-24
مصطلحات موضوعية: Authentication, Spoofing attack, Computer Networks and Communications, business.industry, Computer science, Eavesdropping, Challenge response, Man-in-the-middle attack, Encryption, Computer security, computer.software_genre, Computer Science Applications, Hardware and Architecture, Home automation, business, Replay attack, computer, Software, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::4c270854d07809b2570ee676c90569e4Test
https://doi.org/10.1145/3399432Test