Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …
transportation that takes intelligent commitments to the passengers to improve traffic safety …
Edge-computing-based trustworthy data collection model in the internet of things
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …
satisfying the resource requirements for the emerging mobile applications such as the …
Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing
Both academia and industry have directed tremendous interest toward the combination of
Cyber Physical Systems and Cloud Computing, which enables a new breed of applications …
Cyber Physical Systems and Cloud Computing, which enables a new breed of applications …
Data collection in underwater sensor networks based on mobile edge computing
With the rapid developments in edge devices and wireless technologies, the underwater
wireless sensor networks (UWSNs) are in the process of vigorous development. In UWSNs …
wireless sensor networks (UWSNs) are in the process of vigorous development. In UWSNs …
An incentive-based protection and recovery strategy for secure big data in social networks
Big data sources, such as smart vehicles, IoT devices, and sensor networks, differ from
traditional data sources in both output volume and variety. Big data is usually stored on …
traditional data sources in both output volume and variety. Big data is usually stored on …
A risk defense method based on microscopic state prediction with partial information observations in social networks
The development of network science has led to an increase in the size and user number of
social networks. Messages (eg, rumors, leaked user information) will quickly spread to social …
social networks. Messages (eg, rumors, leaked user information) will quickly spread to social …
A queuing delay utilization scheme for on-path service aggregation in services-oriented computing networks
In services-oriented computing networks, packets in the process of routing to a data center
must wait for a sufficient amount of data before service aggregation to reduce the network …
must wait for a sufficient amount of data before service aggregation to reduce the network …
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system
Abstract Internet of Vehicles (IoV) is a wireless network, which employs well-established
Internet protocols and networks to share information between vehicles, people, and …
Internet protocols and networks to share information between vehicles, people, and …
Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT
Data collection is the basic functions of the Internet of Things (IoT), in which the sensed data
are concentrations from sensor nodes to the sink, with a timely style, so the smart response …
are concentrations from sensor nodes to the sink, with a timely style, so the smart response …
To reduce delay, energy consumption and collision through optimization duty-cycle and size of forwarding node set in WSNs
Fast and energy efficient transmission is an important and challenging issue for wireless
sensor networks (WSNs). Energy efficiency is also an important concern of green …
sensor networks (WSNs). Energy efficiency is also an important concern of green …