Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Network traffic classifier with convolutional and recurrent neural networks for Internet of Things
A network traffic classifier (NTC) is an important part of current network monitoring systems,
being its task to infer the network service that is currently used by a communication flow (eg …
being its task to infer the network service that is currently used by a communication flow (eg …
Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks
Wireless Sensors Networks (WSN) is the self-configured Wireless Ad hoc Networks
(WANET) for Internet of Things (IoT) which consists of a huge measure of resource …
(WANET) for Internet of Things (IoT) which consists of a huge measure of resource …
Blockchain trust model for malicious node detection in wireless sensor networks
The Internet of Things (IoT) has been widely used because of its high efficiency and real-
time collaboration. A wireless sensor network is the core technology to support the operation …
time collaboration. A wireless sensor network is the core technology to support the operation …
[PDF][PDF] A review: secure routing protocols for mobile adhoc networks (MANETs)
Mobile Ad-hoc Network is a multi-hop wireless networking of mobile nodes that have
restricted resources by the conditions of battery life, memory, and processing power. The …
restricted resources by the conditions of battery life, memory, and processing power. The …
Malicious node detection scheme based on correlation of data and network topology in fog computing-based VANETs
In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is
more likely to tamper with transferred data or provide false data easily. Because the …
more likely to tamper with transferred data or provide false data easily. Because the …
Massive SSDF attackers identification in cognitive radio networks by using consistent property
Y Fu, Z He - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
To resist probabilistic spectrum sensing data falsification (SSDF) attacks in cognitive radio
networks (CRNs), we in this paper propose a simple and effective attacker identification …
networks (CRNs), we in this paper propose a simple and effective attacker identification …
Bayesian-inference-based sliding window trust model against probabilistic SSDF attack in cognitive radio networks
Y Fu, Z He - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Collaborative spectrum sensing as a promising approach is widely investigated for
identifying available spectrum in cognitive radio networks. However, such cooperation is …
identifying available spectrum in cognitive radio networks. However, such cooperation is …
Exploiting Trust for Resilient Hypothesis Testing withMalicious Robots
In this article, we develop a resilient binary hypothesis testing framework for decision making
in adversarial multirobot crowdsensing tasks. This framework exploits stochastic trust …
in adversarial multirobot crowdsensing tasks. This framework exploits stochastic trust …
Towards resilient and secure cooperative behavior of intelligent transportation system using sensor technologies
Internet of things (IoT) connects heterogeneous physical objects to collect the observing
data and eases to development of smart transmission systems. Vehicular ad hoc network …
data and eases to development of smart transmission systems. Vehicular ad hoc network …
A novel algorithm for improving malicious node detection effect in wireless sensor networks
As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at
risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …
risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …