[1] Peterson L L, Davie B S. Computer networks:a systems approach[M].[S.l.]:Elsevier, 2007. [2] Atzori L, Iera A, Morabito G. The Internet of Things:a survey[J]. Computer Networks, 2010, 54(15):2787-2805. [3] Shi W, Cao J, Zhang Q, et al. Edge computing:vision and challenges[J]. IEEE Internet of Things Journal, 2016, 3(5):637-646. [4] Nilsson N J. Principles of artificial intelligence[M]. San Francisco:Morgan Kaufmann, 2014. [5] Russell S J, Norvig P. Artificial intelligence:a modern approach[M]. Malaysia:Pearson Education Limited, 2016. [6] Krizhevsky A, Sutskever I, Hinton G E. Imagenet classification with deep convolutional neural networks[C]//Advances in Neural Information Processing Systems, 2012:1097-1105. [7] He K, Zhang X, Ren S, et al. Deep residual learning for image recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016:770-778. [8] Hinton G, Deng L, Yu D, et al. Deep neural networks for acoustic modeling in speech recognition[J]. IEEE Signal Processing Magazine, 2012:29. [9] Bahdanau D, Cho K, Bengio Y. Neural machine translation by jointly learning to align and translate[OL]. 2014. arXiv Preprint arXiv:1409.0473. [10] Kim H, Gupta A. Ontas:flexible and scalable online network traffic anonymization system[C]//Proceedings of the 2019 Workshop on Network Meets AI&ML. ACM, 2019:15-21. [11] Su K, Li J, Fu H. Smart city and the applications[C]//2011 International Conference on Electronics, Communications and Control (ICECC). IEEE, 2011:1028-1031. [12] Chaib-Draa B. Readings in agents[M]. San Francisco:Morgan Kaufmann, 1998. [13] Smith V, Chiang C K, Sanjabi M, et al. Federated multi-task learning[C]//Advances in Neural Information Processing Systems, 2017:4424-4434. [14] Turing S. Intelligent eco networking (IEN):an advanced future Internet of intelligence for digital social economic ecosystem[C]//20181st IEEE International Conference on Hot InformationCentric Networking (HotICN). IEEE, 2018:179-185. [15] Shang W, Yu Y D, Droms R, et al. Challenges in IoT networking via tcp/ip architecture[R]. Technical Report NDN-0038. NDN Project, 2016. [16] Rankin P J, Griffiths J C. Distributed location based service system:US 6879838[P]. 2005-12. [17] Mohurle S, Patil M. A brief study of Wannacry threat:Ransomware attack[J]. International Journal of Advanced Research in Computer Science, 2017, 8(5). [18] Zhang L, Afanasyev A, Burke J, et al. Named data networking[J]. ACM SIGCOMM Computer Communication Review, 2014, 44(3):66-73. [19] Ahlgren B, Dannewitz C, Imbrenda C. et al. A survey of information-centric networking[J]. IEEE Communications Magazine, 2012, 50(7):26-36. [20] Shang W, Bannis A, Liang T, et al. Named data networking of things[C]//2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2016:117-128. [21] Raychaudhuri D, Nagaraja K, Venkataramani A. Mobilityfirst:a robust and trustworthy mobility-centric architecture for the future internet[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2012, 16(3):2-13. [22] Anderson T, Birman K, Broberg R, et al. The nebula future internet architecture[M]//The Future Internet Assembly.[S.l.]:Springer, 2013:16-26. [23] Anand A, Dogar F, Han D, et al. Xia:an architecture for an evolvable and trustworthy Internet[C]//Proceedings of 10th ACM Workshop on Hot Topics in Networks. ACM, 2011:2. [24] Wolf T, Griffioen J, Calvert K L, et al. Choicenet:toward an economy plane for the internet[J]. ACM SIGCOMM Computer Communication Review, 2014, 44(3):58-65, [25] Yuan H, Song T, Crowley P. Scalable NDN forwarding:concepts, issues and principles[C]//201221st International Conference on Computer Communications and Networks (ICCCN). IEEE, 2012:1-9. [26] Lei K, Qin M, Bai B, et al. GCN-GAN:a non-linear temporal link prediction model for weighted dynamic networks[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2019:388-396. [27] Jin T, Zhang X, Liu Y, et al. Block NDN:a bitcoin blockchain decentralized system over named data networking[C]//2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2017:75-80. [28] Zhou Z, Li L, Li Z. Efficient cross-domain authentication scheme based on blockchain technology[J]. Journal of Computer Applications, 2018, 38(2):316-320. [29] Nunes B A A, Mendonca M, Nguyen X N, et al. A survey of software-defined networking:past, present, and future of programmable networks[J]. IEEE Communications Surveys&Tutorials, 2014, 16(3):1617-1634. [30] 韩庆绵.人机物互联的智能服务系统架构研究[J].无线电工程,2017, 47(11):17-21. Han Q M. Research on architecture of intelligent service system about man-machine-object interactive network[J]. Radio Engineering, 2017, 47(11):17-21.(in Chinese) [31] Kreutz D, Ramos F M V, Verissimo P E. et al. Software-defined networking:a comprehensive survey[J]. Proceedings of the IEEE, 2014, 103(1):10-13. [32] Rothenberg C E, Nascimento M R, Salvador M R, et al. Revisiting routing control platforms with the eyes and muscles of software-defined networking[C]//ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2012. [33] Li X, Jiang P, Chen T, et al. A survey on the security of blockchain systems[J]. Future Generation Computer Systems, 2017. DOI:10.1016/j.future.2017.08.020 [34] Jacobson V, Smetters D K, Thornton J D, et al. Networking named content[C]//Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies. ACM, 2009:1-12. [35] Josep A D, Katz R, Konwinski A, et al. A view of cloud computing[J]. Communications of the ACM, 2010, 53(4). [36] Bonomi F, Milito R, Zhu J, et al. Fog computing and its role in the Internet of Things[C]//Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, 2012:13-16. [37] 郭爱鹏,周光涛,夏俊杰,等.基于SDN的边缘网络控制技术及应用[J].邮电设计技术,2014(3):35-39. Guo A P, Zhou G T, Xia J J, et al. Edge network control technology based on SDN and its application[J]. Designing Techniques of Posts and Telecommunications,2014(3):35-39.(in Chinese) [38] 郑植庆.高校校园网出口方案设计与研究[J].信息系统工程,2013, 12:42. [39] Mattila J. The blockchain phenomenon-the disruptive potential of distributed consensus architectures[R]. ETLA Working Papers, 2016. [40] Lei K, Zhang Q, Lou J, et al. Securing ICN-based UAV ad hoc networks with blockchain[J]. IEEE Communications Magazine, 2019, 57(6):26-32. [41] Wu X, Kumar V, Quinlan J R, et al. Top 10 algorithms in data mining[J]. Knowledge and Information Systems, 2008, 14(1):1-37. [42] Mcmahan H B, Ramage D, Talwar K, et al. Learning differentially private recurrent language models[J/OL]. 2017. arXiv preprint arXiv:1710.06963 [43] Yang Q, Liu Y, Chen T, Tong Y. Federated machine learning:concept and applications[J]. ACM Transactions on Intelligent Systems and Technology, 2019, 10(2):1-19. [44] Xie P, Bilenko M, Finley T, et al. Crypto-nets:neural networks over encrypted data[J/OL]. 2014.arXiv preprint arXiv:1412.6181. |