Search Results - "Junfeng, Tian"
-
1
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things
Published in IEEE wireless communications (01-12-2018)“…IoT is leading a digital revolution in both academia and industry. It brings convenience to people's daily lives; however, the issues of security and privacy…”
Get full text
Journal Article -
2
Process and mechanism of transition in regional land use function guided by policy: A case study from Northeast China
Published in Ecological indicators (01-11-2022)“…•Take Northeast China as an example, the mechanism of regional land use function transition guided by policy were analyzed.•Land use function transition guided…”
Get full text
Journal Article -
3
Horae: causal consistency model based on hot data governance
Published in The Journal of supercomputing (01-02-2022)“…Causal consistency has attracted considerable attention in distributed systems because it meets the high availability and high-performance requirements in the…”
Get full text
Journal Article -
4
DCCP: a dependable committee consensus protocol for permissionless blockchain
Published in The Journal of supercomputing (01-03-2023)“…The consensus protocol is the core of blockchain systems. The existing hybrid committee-based consensus protocol is one of the important ways to improve the…”
Get full text
Journal Article -
5
Neighbor Correlated Graph Convolutional Network for multi-stage malaria parasite recognition
Published in Multimedia tools and applications (01-03-2022)“…Malaria is a serious and fatal infectious disease and early detection of the patient’s infection severity can effectively curb the outbreak of this infectious…”
Get full text
Journal Article -
6
A causal consistency model based on grouping strategy
Published in The Journal of supercomputing (01-11-2022)“…Data consistency has always been a significant topic in distributed systems. In the existing consistency models, causal consistency attracts more attention…”
Get full text
Journal Article -
7
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
Published in Mobile networks and applications (01-02-2022)“…Fog computing is a new computing paradigm in the era of the Internet of Things. Aiming at the problem that fog nodes are closer to user equipment, with…”
Get full text
Journal Article -
8
An efficient auditing scheme with a novel structure for multiple replicas
Published in The Journal of supercomputing (01-11-2022)“…The rapid development of cloud storage encourages more and more users to store data onto the cloud. To improve the availability of data services, users usually…”
Get full text
Journal Article -
9
A Method for Processing Static Analysis Alarms Based on Deep Learning
Published in Applied sciences (01-07-2024)“…Automatic static analysis tools (ASATs), also known as static analyzers, have demonstrated their significance and practicability in detecting software defects…”
Get full text
Journal Article -
10
PGCE: A distributed storage causal consistency model based on partial geo-replication and cloud-edge collaboration architecture
Published in Computer networks (Amsterdam, Netherlands : 1999) (20-07-2022)“…The current causal consistency model has trouble facing the high synchronization overheads and response delays found in cloud storage systems. This paper…”
Get full text
Journal Article -
11
Secure and effective assured deletion scheme with orderly overwriting for cloud data
Published in The Journal of supercomputing (2022)“…Due to the characteristics of distribution and virtualization, cloud storage is providing almost limitless storage services. Many users choose to upload data…”
Get full text
Journal Article -
12
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things
Published in The Journal of supercomputing (01-02-2024)“…Compared with the traditional blockchain, blockchain sharding system has higher throughput and is more suitable for the Internet of Things (IoT) with massive…”
Get full text
Journal Article -
13
CCECGP: causal consistency model of edge–cloud collaborative based on grouping protocol
Published in The Journal of supercomputing (01-05-2023)“…At present, most causal consistency models based on cloud storage can no longer meet the needs of delay-sensitive applications. Moreover, the overhead of data…”
Get full text
Journal Article -
14
Few-Shot Federated Learning: A Federated Learning Model for Small-Sample Scenarios
Published in Applied sciences (01-05-2024)“…Traditional federated learning relies heavily on mature datasets, which typically consist of large volumes of uniformly distributed data. While acquiring…”
Get full text
Journal Article -
15
A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption
Published in Multimedia tools and applications (01-09-2021)“…A novel image encryption scheme based on deoxyribonucleic acid (DNA) is proposed utilizing the hash function and coupled map lattices (CML) based on the…”
Get full text
Journal Article -
16
What are the underlying causes and dynamics of land use conflicts in metropolitan junction areas? A case study of the central Chengdu– Chongqing region in China
Published in Regional sustainability (01-09-2024)“…Land use conflicts (LUCs), as a spatial manifestation of the conflicts in the human-land relationships, have a profound impact on regional sustainable…”
Get full text
Journal Article -
17
A dynamic acceleration method for remote sensing image processing based on CUDA
Published in Wireless networks (01-08-2021)“…The incredible increase in the volume of remote sensing data has made the concept of Remote Sensing as Big Data reality with recent technological developments…”
Get full text
Journal Article -
18
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
Published in IEEE access (2019)“…A cloud platform provides users with shared data storage services. To ensure shared data integrity, it is necessary to validate the data effectively. An audit…”
Get full text
Journal Article -
19
Friendship links-based privacy-preserving algorithm against inference attacks
Published in Journal of King Saud University. Computer and information sciences (01-11-2022)“…Directly publishing the original data of social networks may compromise personal privacy because social relationship data contain sensitive information about…”
Get full text
Journal Article -
20
Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks
Published in EURASIP Journal on Information Security (24-05-2020)“…Aiming at preventing user data leakage and the damage that is caused by co-resident attacks in the cloud environment, a data partitioning and encryption backup…”
Get full text
Journal Article