关注
Jinfa Wang
Jinfa Wang
Beijing Key Laboratory of IoT Information Security, Institute of Information Engineering, CAS
在 iie.ac.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An architecture design and topological model of intergrid
Z Hai, C Wei, W Jinfa, J Siyuan
Transactions of China electrotechnical society 30 (11), 30-36, 2015
312015
能源互联网架构设计与拓扑模型
赵海, 蔡巍, 王进法, 贾思媛
电工技术学报 30 (11), 30-36, 2015
282015
A unifying network topological model of the energy internet macro-scope structure
W Cai, H Zhao, J Wang, C Lin
Proceedings of the CSEE 35 (14), 3503-3510, 2015
282015
能源互联网宏观结构的统一网络拓扑模型
蔡巍, 赵海, 王进法, 林川
中国电机工程学报 35 (14), 3503-3510, 2015
172015
Evolution of the internet AS-level topology:From nodes and edges to components
HZ Xiao Liu, Jinfa Wang, Wei Jing, Menno de Jong, Jeroen S. Tummers
Chin. Phys. B 27 (12), 120501-120501, 2018
142018
Energy-efficient and fault-tolerant evolution models based on link prediction for large-scale wireless sensor networks
S Si, J Wang, C Yu, H Zhao
IEEE Access 6, 73341-73356, 2018
142018
Using intuitionistic fuzzy set for anomaly detection of network traffic from flow interaction
J Wang, H Zhao, J Xu, H Li, H Zhu, S Chao, C Zheng
IEEE Access 6, 64801-64816, 2018
142018
Improving controllability of complex networks by rewiring links regularly
J Xu, J Wang, H Zhao, S Jia
The 26th Chinese Control and Decision Conference (2014 CCDC), 642-645, 2014
132014
Scheduling algorithms for time-constrained big-file transfers in the Internet of Vehicles
C Lin, Y Bi, H Zhao, Z Wang, J Wang
Journal of Communications and Information Networks 2 (2), 126-135, 2017
102017
Using complex network theory for temporal locality in network traffic flows
JF Wang, X He, SZ Si, H Zhao, C Zheng, H Yu
Physica A: Statistical Mechanics and its Applications 524, 722-736, 2019
92019
Internet anomaly detection based on complex network path
J Wang, S Jia, H Zhao, J Xu, C Lin
IEICE Transactions on Communications 101 (12), 2397-2408, 2018
82018
Anomaly Detection of Complex Networks Based on Intuitionistic Fuzzy Set Ensemble
JF Wang, X Liu, HZ Zhao, XC Chen
Chinese Physics Letters 35 (5), 058901, 2018
82018
Xlboost-geo: An ip geolocation system based on extreme landmark boosting
Y Wang, H Zhu, J Wang, J Liu, Y Wang, L Sun
arXiv preprint arXiv:2010.13396, 2020
62020
Virus spreading model based on degree correlation and its analysis
JQ Xu, JF Wang, J Zhang, H Zhao
Sci China Ser F Inf Sci 66, 793-810, 2014
62014
ProsegDL: Binary protocol format extraction by deep learning-based field boundary identification
S Zhao, J Wang, S Yang, Y Zeng, Z Zhao, H Zhu, L Sun
2022 IEEE 30th International Conference on Network Protocols (ICNP), 1-12, 2022
42022
Research on life characteristics of Internet based on network motifs
J Wang, H Zhao, X Liu
arXiv preprint arXiv:1611.01361, 2016
42016
Dissipation analysis of internet topology structure
X LIU, H ZHAO, J WANG, X HE
Journal of Northeastern University (Natural Science) 36 (9), 1237, 2015
42015
Detection and incentive: A tampering detection mechanism for object detection in edge computing
Z Zhao, Y Zeng, J Wang, H Li, H Zhu, L Sun
2022 41st International Symposium on Reliable Distributed Systems (SRDS …, 2022
32022
CPS 资源服务模型和资源调度研究
徐久强, 郭雪静, 王进法, 李鹤群, 赵海
计算机学报 41 (10), 2330-2343, 2018
22018
Construction of pest relationship network based on space influence domain and its analysis
J WANG, H ZHAO, X LIU, H LI
Journal of Northeastern University (Natural Science) 37 (12), 1700, 2016
22016
系统目前无法执行此操作,请稍后再试。
文章 1–20