متابعة
Jingjing Tan
Jingjing Tan
Central South university, Changsha University of Science and Technology
بريد إلكتروني تم التحقق منه على csust.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Effective charging identity authentication scheme based on fog computing in V2G networks
Z Xia, Z Fang, K Gu, J Wang, J Tan, G Wang
Journal of Information Security and Applications 58, 102649, 2021
252021
Research on Fair Trading Mechanism of Surplus Power Based on Blockchain.
Z Xia, J Tan, J Wang, R Zhu, H Xiao, AK Sangaiah
J. Univers. Comput. Sci. 25 (10), 1240-1260, 2019
222019
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids
Z Xia, J Tan, K Gu, WJ Jia
Journal of Parallel and Distributed Computing 147, 236-247, 2021
142021
Frequency selective surface towards 6G communication systems: A contemporary survey
X Chen, J Tan, L Kang, F Tang, M Zhao, N Kato
IEEE Communications Surveys & Tutorials, 2024
132024
Intelligent configuration method based on UAV-driven frequency selective surface for communication band shielding
J Tan, X Dai, F Tang, M Zhao, N Kato
IEEE Internet of Things Journal 10 (13), 11507-11517, 2023
112023
Adaptive caching scheme for jointly optimizing delay and energy consumption in heterogeneous digital twin iot
J Tan, F Tang, M Zhao, Y Zhu
IEEE Transactions on Network Science and Engineering 10 (6), 4020-4032, 2023
102023
IDS intelligent configuration scheme against advanced adaptive attacks
Z Xia, J Tan, K Gu, X Li, W Jia
IEEE Transactions on Network Science and Engineering 8 (2), 995-1008, 2020
92020
Performance Analysis of Space-Air-Ground Integrated Network (SAGIN): UAV Altitude and Position Angle
J Tan, F Tang, M Zhao, N Kato
2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2023
42023
Bidirectional LSTM-based attention mechanism for CNN power theft detection
Z Xia, K Zhou, J Tan, H Zhou
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
22022
A Survey on Intelligent Network Operations and Performance Optimization Based on Large Language Models
S Long, J Tan, B Mao, F Tang, Y Li, M Zhao, N Kato
IEEE Communications Surveys & Tutorials, 2025
2025
Dual-Layered Model Protection Scheme Against Backdoor Attacks in Fog Computing-Based Federated Learning
K Gu, Y Zuo, J Tan, B Yin, Z Yang, X Li
IEEE Transactions on Network and Service Management, 2024
2024
Outage Probability, Performance, Fairness Analysis of Space-Air-Ground Integrated Network (SAGIN): UAV Altitude and Position Angle
J Tan, F Tang, M Zhao, N Kato
IEEE Transactions on Wireless Communications, 2024
2024
TIDL-IDS: A Time-Series Imaging and Deep Learning-Based IDS for Connected Autonomous Vehicles
Z Xia, L Huang, J Tan, F Jiang, Z Hu
International Conference on Information Security, 269-285, 2024
2024
Privacy-Preserving Data Sharing in IoV: A Federated Learning and Blockchain-Based Approach
Z Xia, J Sun, J Tan
2024 IEEE International Conference on Communications Workshops (ICC …, 2024
2024
Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems
Z Xia, K Lin, J Tan, Z Hu
2024 27th International Conference on Computer Supported Cooperative Work in …, 2024
2024
Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water Conservancy
Z Xia, S Wang, J Tan, Z Hu
2024 27th International Conference on Computer Supported Cooperative Work in …, 2024
2024
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–16