بحث بسيط
السجلات المعروضة 51 -- 58 من 58
A Blockchain-based Conditional Privacy-Preserving Traffic Data Sharing in Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
As a typical application scenarios of Internet of Things (IoT), Internet of Vehicles (IoV) is playing an important role in the field of intelligent transportation. In such a system, vehicles are allowed to collect ambient ...
Outlier detection approaches based on machine learning in the internet-of-things
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Outlier detection in the Internet of Things (IoT) is an essential challenge issue studied in numerous fields, including fraud monitoring, intrusion detection, secure localization, trust management, and so on. Conventional ...
Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of communication technologies, vehicular network applications have evolved from basic traffic safety and efficiency applications to information and entertainment applications. The implementation of ...
A Differentially Private Classification Algorithm with High Utility for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The advancement of the wireless body area networks (WBAN) and sensor technologies allows us to collect a variety of physiological and behavioral data from human body. And appropriate application of machine learning methods ...
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ...
Combating jamming attacks in multi-channel IoT networks using game theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks
(
IEEE
, 2022 , Conference Paper)
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming attacks are among the most effective ...
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
With the exponential growth in IoT devices, especially in healthcare systems, where multiple devices are attributed to one person, the need for a secure and effective group secret key (GSK) generation is intrinsic. GSKs ...