• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:董晨

Refining:

Source

Submit Unfold

Co-

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 11 >
Multi-granularity visual-textual jointly modeling for aspect-level multimodal sentiment analysis SCIE
期刊论文 | 2025 , 81 (1) | JOURNAL OF SUPERCOMPUTING
Abstract&Keyword Cite Version(2)

Abstract :

Aspect-level multimodal sentiment analysis aims to ascertain the sentiment polarity of a given aspect from a text review and its accompanying image. Despite substantial progress made by existing research, aspect-level multimodal sentiment analysis still faces several challenges: (1) Inconsistency in feature granularity between the text and image modalities poses difficulties in capturing corresponding visual representations of aspect words. This inconsistency may introduce irrelevant or redundant information, thereby causing noise and interference in sentiment analysis. (2) Traditional aspect-level sentiment analysis predominantly relies on the fusion of semantic and syntactic information to determine the sentiment polarity of a given aspect. However, introducing image modality necessitates addressing the semantic gap in jointly understanding sentiment features in different modalities. To address these challenges, a multi-granularity visual-textual feature fusion model (MG-VTFM) is proposed to enable deep sentiment interactions among semantic, syntactic, and image information. First, the model introduces a multi-granularity hierarchical graph attention network that controls the granularity of semantic units interacting with images through constituent tree. This network extracts image sentiment information relevant to the specific granularity, reduces noise from images and ensures sentiment relevance in single-granularity cross-modal interactions. Building upon this, a multilayered graph attention module is employed to accomplish multi-granularity sentiment fusion, ranging from fine to coarse. Furthermore, a progressive multimodal attention fusion mechanism is introduced to maximize the extraction of abstract sentiment information from images. Lastly, a mapping mechanism is proposed to align cross-modal information based on aspect words, unifying semantic spaces across different modalities. Our model demonstrates excellent overall performance on two datasets.

Keyword :

Aspect-level sentiment analysis Aspect-level sentiment analysis Constituent tree Constituent tree Multi-granularity Multi-granularity Multimodal data Multimodal data Visual-textual feature fusion Visual-textual feature fusion

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Chen, Yuzhong , Shi, Liyuan , Lin, Jiali et al. Multi-granularity visual-textual jointly modeling for aspect-level multimodal sentiment analysis [J]. | JOURNAL OF SUPERCOMPUTING , 2025 , 81 (1) .
MLA Chen, Yuzhong et al. "Multi-granularity visual-textual jointly modeling for aspect-level multimodal sentiment analysis" . | JOURNAL OF SUPERCOMPUTING 81 . 1 (2025) .
APA Chen, Yuzhong , Shi, Liyuan , Lin, Jiali , Chen, Jingtian , Zhong, Jiayuan , Dong, Chen . Multi-granularity visual-textual jointly modeling for aspect-level multimodal sentiment analysis . | JOURNAL OF SUPERCOMPUTING , 2025 , 81 (1) .
Export to NoteExpress RIS BibTex

Version :

Multi-granularity visual-textual jointly modeling for aspect-level multimodal sentiment analysis Scopus
期刊论文 | 2025 , 81 (1) | Journal of Supercomputing
Multi-granularity visual-textual jointly modeling for aspect-level multimodal sentiment analysis EI
期刊论文 | 2025 , 81 (1) | Journal of Supercomputing
便携式隐私安全数字微流控生物芯片
期刊论文 | 2024 , 41 (11) , 268-272,340 | 计算机应用与软件
Abstract&Keyword Cite

Abstract :

为了提高数字微流控生物芯片(Digital Microfluidic Biochip,DMFB)的便携性,促进其发展及应用,提出可移动DMFB模型.该模型将微控制器通过无线模块与云服务器传输生化协议,并实时获得响应结果.考虑芯片与云服务器访问的安全隐患,采用对称加密算法SM4 和SM2 构造的数字签名算法保证数据传输及云服务器访问安全.设计数据在传输中的处理细节和用户使用操作过程对其身份验证的各个流程.实验结果表明,该模型在时间和空间上具有可行性.

Keyword :

DMFB DMFB SM2 SM2 SM4 SM4 无线通信 无线通信

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 柳煌达 , 董晨 , 刘灵清 et al. 便携式隐私安全数字微流控生物芯片 [J]. | 计算机应用与软件 , 2024 , 41 (11) : 268-272,340 .
MLA 柳煌达 et al. "便携式隐私安全数字微流控生物芯片" . | 计算机应用与软件 41 . 11 (2024) : 268-272,340 .
APA 柳煌达 , 董晨 , 刘灵清 , 连思璜 . 便携式隐私安全数字微流控生物芯片 . | 计算机应用与软件 , 2024 , 41 (11) , 268-272,340 .
Export to NoteExpress RIS BibTex

Version :

Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology EI
会议论文 | 2024 , 82-89 | IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
Abstract&Keyword Cite Version(1)

Abstract :

Digital microfluidic biochips (DMFBs), by precisely controlling and manipulating minute fluids, have realized the integration, automation, and cost-effectiveness of biochemical experiments and are applied in various fields such as medical diagnostics, drug development, and environmental monitoring. However, due to the composition of microelectronic component arrays, DMFBs are prone to electrode faults, leading to erroneous biochemical operations and, consequently, inaccurate experimental results. In this paper, a test path optimization algorithm combining an improved grey wolf algorithm and priority strategy is proposed to solve the problem of an extended test droplet path when DMFB tests faulty electrodes. By encoding the priority of the electrodes of the DMFB and the paths between the electrodes, the test droplet routing is performed according to the priority order. The priority coefficients are dynamically adjusted using the improved grey wolf algorithm to shorten the testing path length. Experimental results demonstrate that the proposed path optimization algorithm reduces the path length by 0.45% to 2.08% compared to the Eulerian circuit method in offline testing, achieving the theoretical optimum value, and by 4.90% to 10.53% compared to the ant colony algorithm in online testing. This provides an essential foundation for accelerating the safe and reliable development of DMFBs in healthcare. © 2024 IEEE.

Keyword :

Ant colony optimization Ant colony optimization Diagnosis Diagnosis Digital microfluidics Digital microfluidics Microfluidic chips Microfluidic chips Swarm intelligence Swarm intelligence

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yang, Zhongliao , Xie, Zhengye , Dong, Chen et al. Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology [C] . 2024 : 82-89 .
MLA Yang, Zhongliao et al. "Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology" . (2024) : 82-89 .
APA Yang, Zhongliao , Xie, Zhengye , Dong, Chen , Fan, Xinmin , Chen, Zhenyi . Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology . (2024) : 82-89 .
Export to NoteExpress RIS BibTex

Version :

Digital Microfluidic Biochips Test Path Planning Based on Swarm Intelligence Optimization and Internet of Things Technology Scopus
其他 | 2024 , 82-89 | Proceedings - IEEE Congress on Cybermatics: 2024 IEEE International Conferences on Internet of Things, iThings 2024, IEEE Green Computing and Communications, GreenCom 2024, IEEE Cyber, Physical and Social Computing, CPSCom 2024, IEEE Smart Data, SmartData 2024
MalDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder EI
会议论文 | 2024 , 133-140 | IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
Abstract&Keyword Cite Version(1)

Abstract :

With each advancement in internet technology, new security challenges arise. The prevalence of malicious programs continues to increase, which makes it crucial to detect and address them effectively. Many researchers focus on solving different datasets by using deep learning methods and make significant progress. However, these strategies must be continuously improved to adapt to the latest data. In this paper, an improved model based on CNN-LSTM is proposed to detect and classify malware programs, named malDetect I. At the same time, the Transformer Encoder module is also modified based on model Bert to adapt to the classification task. Lastly, two models are compared with prediction results on evaluation indicators. The data used in this paper is the Windows API sequence extracted after dynamic operation. The text processing methods are also suitable for processing sequence data. The experiment uses Word2Vec and two different learning rate strategies, and the improved model accuracy is 9.83% higher than the original CNN-LSTM model. The model integrated the BiLSTM model with the Self-Attention mechanism, named malDetect II, is 11.46% higher than the basic model CNN-LSTM and 2.82% higher than the Transformer Encoder classification model. © 2024 IEEE.

Keyword :

Data handling Data handling Deep learning Deep learning

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Jingjing , Lin, Jingsong , Lyu, Chenxi et al. MalDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder [C] . 2024 : 133-140 .
MLA Lin, Jingjing et al. "MalDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder" . (2024) : 133-140 .
APA Lin, Jingjing , Lin, Jingsong , Lyu, Chenxi , Fan, Xinmin , Dong, Chen . MalDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder . (2024) : 133-140 .
Export to NoteExpress RIS BibTex

Version :

MalDetect: Malware Classification Using API Sequence and Comparison with Transformer Encoder Scopus
其他 | 2024 , 133-140 | Proceedings - IEEE Congress on Cybermatics: 2024 IEEE International Conferences on Internet of Things, iThings 2024, IEEE Green Computing and Communications, GreenCom 2024, IEEE Cyber, Physical and Social Computing, CPSCom 2024, IEEE Smart Data, SmartData 2024
Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips SCIE
期刊论文 | 2024 , 36 (3) | JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
Abstract&Keyword Cite Version(1)

Abstract :

Digital microfluidic biochips (DMFBs) have a significant stride in the applications of medicine and the biochemistry in recent years. DMFBs based on micro -electrode -dot -array (MEDA) architecture, as the nextgeneration DMFBs, aim to overcome drawbacks of conventional DMFBs, such as droplet size restriction, low accuracy, and poor sensing ability. Since the potential market value of MEDA biochips is vast, it is of paramount importance to explore approaches to protect the intellectual property (IP) of MEDA biochips during the development process. In this paper, an IP authentication strategy based on the multi-PUF applied to MEDA biochips is presented, called bioMPUF, consisting of Delay PUF, Split PUF and Countermeasure. The bioMPUF strategy is designed to enhance the non -linearity between challenges and responses of PUFs, making the challenge-response pairs (CRPs) on the MEDA biochips are difficult to be anticipated, thus thwarting IP piracy attacks. Moreover, based on the easy degradation of MEDA biochip electrodes, a countermeasure is proposed to destroy the availability of piracy chips. Experimental results demonstrate the feasibility of the proposed bioMPUF strategy against the brute force attack and modeling attack.

Keyword :

Hardware security Hardware security IP protection IP protection MEDA biochips MEDA biochips Modeling attack Modeling attack Multi-PUF Multi-PUF

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Dong, Chen , Guo, Xiaodong , Lian, Sihuang et al. Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips [J]. | JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES , 2024 , 36 (3) .
MLA Dong, Chen et al. "Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips" . | JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 36 . 3 (2024) .
APA Dong, Chen , Guo, Xiaodong , Lian, Sihuang , Yao, Yinan , Chen, Zhenyi , Yang, Yang et al. Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips . | JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES , 2024 , 36 (3) .
Export to NoteExpress RIS BibTex

Version :

Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips Scopus
期刊论文 | 2024 , 36 (3) | Journal of King Saud University - Computer and Information Sciences
Efficient and Reliable Federated Recommendation System in Temporal Scenarios EI
会议论文 | 2024 , 14504 , 97-107 | 18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
Abstract&Keyword Cite Version(1)

Abstract :

Addressing privacy concerns and the evolving nature of user preferences, it is crucial to explore collaborative training methods for federated recommendation models that match the performance of centralized models while preserving user privacy. Existing federated recommendation models primarily rely on static relational data, overlooking the temporal patterns that dynamically evolve over time. In domains like travel recommendations, factors such as the availability of attractions, introduction of new activities, and media coverage constantly change, influencing user preferences. To tackle these challenges, we propose a novel approach called FedNTF. It leverages an LSTM encoder to capture multidimensional temporal interactions within relational data. By incorporating tensor factorization and multilayer perceptrons, we project users and items into a latent space with time encoding, enabling the learning of nonlinear relationships among diverse latent factors. This approach not only addresses the privacy concerns by preserving the confidentiality of user data but also enables the modeling of temporal dynamics to enhance the accuracy and relevance of recommendations over time. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2024.

Keyword :

Factorization Factorization Learning systems Learning systems Long short-term memory Long short-term memory Recommender systems Recommender systems Signal encoding Signal encoding Tensors Tensors User profile User profile

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ye, Jingzhou , Lin, Hui , Wang, Xiaoding et al. Efficient and Reliable Federated Recommendation System in Temporal Scenarios [C] . 2024 : 97-107 .
MLA Ye, Jingzhou et al. "Efficient and Reliable Federated Recommendation System in Temporal Scenarios" . (2024) : 97-107 .
APA Ye, Jingzhou , Lin, Hui , Wang, Xiaoding , Dong, Chen , Liu, Jianmin . Efficient and Reliable Federated Recommendation System in Temporal Scenarios . (2024) : 97-107 .
Export to NoteExpress RIS BibTex

Version :

Efficient and Reliable Federated Recommendation System in Temporal Scenarios Scopus
其他 | 2024 , 14504 , 97-107 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm EI
会议论文 | 2024 , 14504 , 47-62 | 18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
Abstract&Keyword Cite Version(1)

Abstract :

The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage load to provide IaaS service. After the surging development, more and more companies are gradually paying attention to the specific user experience in cloud computing. But there are few works about that aspect in load balance problem. Therefore, we consider the load balancing resource allocation problem, from the perspective of user experience, mainly based on geographical distance and regional Equilibrium, combined with user usage habits, in multiple service periods. A detailed mathematical definition has been established for this problem. This article proposes a mathematical model for the problem, along with an modified CMA-ES (Covariance Matrix Adaptation Evolution Strategy) algorithm, called WS-ESS-CMA-ES algorithm, to allocate computing resources and solve the above problem. The process of using the proposed algorithm to solve the problem of cloud computing resource allocation in real scenarios is simulated, and compared with some other algorithms. The experiment results show that our algorithm performs well. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2024.

Keyword :

Cloud computing Cloud computing Covariance matrix Covariance matrix Evolutionary algorithms Evolutionary algorithms Resource allocation Resource allocation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Luo, Jihai , Dong, Chen , Chen, Zhenyi et al. A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm [C] . 2024 : 47-62 .
MLA Luo, Jihai et al. "A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm" . (2024) : 47-62 .
APA Luo, Jihai , Dong, Chen , Chen, Zhenyi , Xu, Li , Chen, Tianci . A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm . (2024) : 47-62 .
Export to NoteExpress RIS BibTex

Version :

A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm Scopus
其他 | 2024 , 14504 , 47-62 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm EI
会议论文 | 2024 , 14503 , 209-222 | 18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
Abstract&Keyword Cite Version(1)

Abstract :

With the development of technology, robots are gradually being used more and more widely in various fields. Industrial robots need to perform path planning in the course of their tasks, but there is still a lack of a simple and effective method to implement path planning in complex industrial scenarios. In this paper, an improved whale optimization algorithm is proposed to solve the robot path planning problem. The algorithm initially uses a logistic chaotic mapping approach for population initialization to enhance the initial population diversity, and proposes a jumping mechanism to help the population jump out of the local optimum and enhance the global search capability of the population. The proposed algorithm is tested on 12 complex test functions and the experimental results show that the improved algorithm achieves the best results in several test functions. The algorithm is then applied to a path planning problem and the results show that the algorithm can help the robot to perform correct and efficient path planning. © 2024, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Keyword :

Industrial robots Industrial robots Mapping Mapping Motion planning Motion planning Optimization Optimization Robot programming Robot programming

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Peixin , Dong, Chen , Chen, Zhenyi et al. An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm [C] . 2024 : 209-222 .
MLA Huang, Peixin et al. "An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm" . (2024) : 209-222 .
APA Huang, Peixin , Dong, Chen , Chen, Zhenyi , Zhen, Zihang , Jiang, Lei . An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm . (2024) : 209-222 .
Export to NoteExpress RIS BibTex

Version :

An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm Scopus
其他 | 2024 , 14503 , 209-222 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ATAL: Active Learning Using Adversarial Training for Data Augmentation SCIE
期刊论文 | 2024 , 11 (3) , 4787-4800 | IEEE INTERNET OF THINGS JOURNAL
Abstract&Keyword Cite Version(2)

Abstract :

Active learning (AL) tries to maximize the model's performance when the labeled data set is limited, and the annotation cost is high. Although it can be efficiently implemented in deep neural networks (DNNs), it is questionable whether the model can maintain the ability to generalize well when there are significant distributional deviations between the labeled and unlabeled data sets. In this article, we consider introducing adversarial training and adversarial samples into AL to mitigate the problem of degraded generalization performance due to different data distributions. In particular, our proposed adversarial training AL (ATAL) has two advantages, one is that adversarial training by different networks enables the network to have better prediction performance and robustness with limited labeled samples. The other is that the adversarial samples generated by the adversarial training can effectively expand the labeled data set so that the designed query function can efficiently select the most informative unlabeled samples based on the expanded labeled data set. Extensive experiments have been performed to verify the feasibility and efficiency of our proposed method, i.e., CIFAR-10 demonstrates the effectiveness of our method-new state-of-the-art robustness and accuracy are achieved.

Keyword :

Active learning (AL) Active learning (AL) adversarial learning adversarial learning adversarial samples adversarial samples Bayes methods Bayes methods data distribution data distribution Data models Data models Generative adversarial networks Generative adversarial networks Labeling Labeling robustness robustness Robustness Robustness Training Training Uncertainty Uncertainty

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Xuanwei , Liu, Ximeng , Chen, Bijia et al. ATAL: Active Learning Using Adversarial Training for Data Augmentation [J]. | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (3) : 4787-4800 .
MLA Lin, Xuanwei et al. "ATAL: Active Learning Using Adversarial Training for Data Augmentation" . | IEEE INTERNET OF THINGS JOURNAL 11 . 3 (2024) : 4787-4800 .
APA Lin, Xuanwei , Liu, Ximeng , Chen, Bijia , Wang, Yuyang , Dong, Chen , Hu, Pengzhen . ATAL: Active Learning Using Adversarial Training for Data Augmentation . | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (3) , 4787-4800 .
Export to NoteExpress RIS BibTex

Version :

ATAL: Active Learning Using Adversarial Training for Data Augmentation Scopus
期刊论文 | 2024 , 11 (3) , 4787-4800 | IEEE Internet of Things Journal
ATAL: Active Learning Using Adversarial Training for Data Augmentation EI
期刊论文 | 2024 , 11 (3) , 4787-4800 | IEEE Internet of Things Journal
PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices SCIE
期刊论文 | 2024 , 24 (2) | SENSORS
Abstract&Keyword Cite Version(2)

Abstract :

Electronic tickets (e-tickets) are gradually being adopted as a substitute for paper-based tickets to bring convenience to customers, corporations, and governments. However, their adoption faces a number of practical challenges, such as flexibility, privacy, secure storage, and inability to deploy on IoT devices such as smartphones. These concerns motivate the current research on e-ticket systems, which seeks to ensure the unforgeability and authenticity of e-tickets while simultaneously protecting user privacy. Many existing schemes cannot fully satisfy all these requirements. To improve on the current state-of-the-art solutions, this paper constructs a blockchain-enhanced privacy-preserving e-ticket system for IoT devices, dubbed PriTKT, which is based on blockchain, structure-preserving signatures (SPS), unlinkable redactable signatures (URS), and zero-knowledge proofs (ZKP). It supports flexible policy-based ticket purchasing and ensures user unlinkability. According to the data minimization and revealing principle of GDPR, PriTKT empowers users to selectively disclose subsets of (necessary) attributes to sellers as long as the disclosed attributes satisfy ticket purchasing policies. In addition, benefiting from the decentralization and immutability of blockchain, effective detection and efficient tracing of double spending of e-tickets are supported in PriTKT. Considering the impracticality of existing e-tickets schemes with burdensome ZKPs, we replace them with URS/SPS or efficient ZKP to significantly improve the efficiency of ticket issuing and make it suitable for use on smartphones.

Keyword :

blockchain blockchain double-spending detection double-spending detection electronic tickets electronic tickets IoT IoT privacy-preserving privacy-preserving

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhan, Yonghua , Yuan, Feng , Shi, Rui et al. PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices [J]. | SENSORS , 2024 , 24 (2) .
MLA Zhan, Yonghua et al. "PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices" . | SENSORS 24 . 2 (2024) .
APA Zhan, Yonghua , Yuan, Feng , Shi, Rui , Shi, Guozhen , Dong, Chen . PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices . | SENSORS , 2024 , 24 (2) .
Export to NoteExpress RIS BibTex

Version :

PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices EI
期刊论文 | 2024 , 24 (2) | Sensors
PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices Scopus
期刊论文 | 2024 , 24 (2) | Sensors
10| 20| 50 per page
< Page ,Total 11 >

Export

Results:

Selected

to

Format:
Online/Total:133/9273216
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1