E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:WASA (17. : 2022 : Dalian) Wireless algorithms, systems, and applications ; Part 1
1. Verfasser: Wang, Yizong (VerfasserIn)
Weitere Verfasser: Wang, Haoyu (VerfasserIn), Zhao, Dong (VerfasserIn), Yang, Fuyu (VerfasserIn), Ma, Huadong (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement 2022 Zhao, Jiapeng
A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs 2022 Li, Zhaowei
A Novel Self-supervised Few-shot Network Intrusion Detection Method 2022 Zhang, Jing
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks 2022 Xu, Shiyu
An Efficient Soft Analytical Side-Channel Attack on Ascon 2022 Luo, Sinian
Phishing Frauds Detection Based on Graph Neural Network on Ethereum 2022 Duan, Xincheng
Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless Devices 2022 Dang, Xiaochao
A Caching Strategy Based on Spreading Influence in Information-Centric Satellite Networks 2022 Wang, Haowei
E2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi Systems 2022 Wang, Yizong
A Spatial-Temporal Convolutional Model with Improved Graph Representation 2022 Lv, Yang
A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems 2022 Ouyang, Fang
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT 2022 Sun, Mengjie
A Smart Contract-Based Intelligent Traffic Adaptive Signal Control Scheme 2022 Wang, Wenyue
Opportunistic Network Routing Algorithm Based on Ferry Node Cluster Active Motion and Collaborative Computing 2022 Xu, Gang
Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks 2022 Du, Ruizhong
CA-Free Real-Time Fuzzy Digital Signature Scheme 2022 Yan, Yijie
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage 2022 Wu, Yueqing
Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation 2022 Yang, Xu
Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on Blockchain 2022 Jin, Yan
Collusion-Tolerant Data Aggregation Method for Smart Grid 2022 Cao, Liyuan
Alle Artikel auflisten