共 48 条
- [1] Zheng X(2016)The evolution trend of information management of supply chain in China under the information environment Inf. Sci. 10 128-133
- [2] Ge B(2015)Data integrity protection method for icroorganism sampling robots based on blockchain technology J. Huazhong Univ. Sci. Technol. 43 216-219
- [3] Zhao H(2015)Block chain thinking: the brain as a decentralized auto nomous corporation IEEE Technol. Soc. Mag. 34 41-52
- [4] Li XF(2010)The internet of things: a survey Comput. Netw. 54 2787-2805
- [5] Zhan LK(2004)Distributed decision fusion with a random access channel for sensor network applications IEEE Trans. Instrum. Meas. 53 1239-1320
- [6] Swan M(2003)Power efficient data gathering and aggregation in wireless sensor networks ACM SIGMOD Record 32 50-89
- [7] Atzori L(1987)An intrusion -detection model IEEE Trans. Softw. Eng. 13 220-235
- [8] Iera A(2017)Single image shadow detection and removal based on feature fusion and multiple dictionary learning Multimed. Tools Appl. 38 360-372
- [9] Morabito G(2016)A novel SVM-kNN-PSO ensemble method for intrusion detection system Appl. Soft Comput. 10 39-192
- [10] Yuan Y(2017)An intelligent hybrid model for power flow optimization in the cloud-IOT electrical distribution network Clust. Comput. 87 185-1153