搜索筛选:
搜索耗时5.5260秒,为你在为你在102,285,761篇论文里面共找到 8 篇相符的论文内容
类      型:
[会议论文] 作者:Weijin Jiang,Jiahui Chen, 来源:第十四届和谐人机环境联合学术会议HHME2018(第十四届人机交互学术会议CHCI2018、第十四届全国普适计算学术会议 年份:2018
In Mobile Internet(MI),existing uncertain factors,such as randomness,fuzziness and unpredictability,brought many security issues to on-line transactions....
[会议论文] 作者:Weijin Jiang,Jiahui Chen, 来源:第十四届和谐人机环境联合学术会议HHME2018(第十四届人机交互学术会议CHCI2018、第十四届全国普适计算学术会议 年份:2018
Trust-based celebrity user identification is the key to the industrys reputation for electronic word of mouth....
[期刊论文] 作者:Weijin Jiang,Xiaoliang Liu,Xin, 来源:中国通信:英文版 年份:2020
In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by resear...
[期刊论文] 作者:Weijin Jiang,Fang Ye,Shengjie, 来源:中国通信:英文版 年份:2020
As one of the key technologies of cloud computing,the virtualization technology can virtualize all kinds of resources and integrate them into the unified planni...
[期刊论文] 作者:Weijin Jiang,Sijian Lv,Yirong, 来源:中国通信:英文版 年份:2020
The use of symbol attributes on the side of symbolic social networks to analyze,understand,and predict the topology,function,and dynamic behaviour of complex ne...
[期刊论文] 作者:Weijin Jiang,Yang Wang,Yirong, 来源:中国通信:英文版 年份:2019
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security t...
[期刊论文] 作者:Weijin Jiang,Sijian Lv,Yirong Jiang,Jiahui Chen,Fang Ye,Xiaoliang Liu, 来源:中国通信(英文版) 年份:2020
The use of symbol attributes on the side of symbolic social networks to analyze,understand,and predict the topology,function,and dynamic behaviour of complex ne...
[期刊论文] 作者:Weijin Jiang,Yang Wang,Yirong Jiang,Jiahui Chen,Yuhui Xu,Lina Tan, 来源:中国通信(英文版) 年份:2019
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security t...
相关搜索: