• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4711722)   Today's Articles (5437)
For: Liu X, Yu X, Zhu H, Yang G, Wang Y, Yu X. A game‐theoretic approach of mixing different qualities of coins. INT J INTELL SYST 2020. [DOI: 10.1002/int.22277] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
Number Cited by Other Article(s)
1
Voundi Koe AS, Ai S, Chen Q, Tang J, Chen K, Zhang S, Li X. Hieraledger: Towards Malicious Gateways in Appendable-Block Blockchain Constructions for IoT. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.02.077] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/06/2023]
2
Yu W, Zhang L, Ge N. An adaptive multiobjective evolutionary algorithm for dynamic multiobjective flexible scheduling problem. INT J INTELL SYST 2022. [DOI: 10.1002/int.23090] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
3
Wang Y, Li T, Liu M, Li C, Wang H. STSIIML: Study on token shuffling under incomplete information based on machine learning. INT J INTELL SYST 2022. [DOI: 10.1002/int.23033] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
4
Voundi Koe AS, Ai S, Huang P, Yan A, Tang J, Chen Q, Mo K, Jie W, Zhang S. Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.05.054] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
5
Dootio MA, Lakhan A, Sodhro AH, Groenli TM, Bawany NZ, Kumar S. Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2022;19:513-536. [PMID: 34903001 DOI: 10.3934/mbe.2022024] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
6
Ren P, Li F, Wang Y, Zhou H, Liu P. IPSadas: Identity‐privacy‐aware secure and anonymous data aggregation scheme. INT J INTELL SYST 2021. [DOI: 10.1002/int.22793] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
7
Dynamic Application Partitioning and Task-Scheduling Secure Schemes for Biosensor Healthcare Workload in Mobile Edge Cloud. ELECTRONICS 2021. [DOI: 10.3390/electronics10222797] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA