Search
Now showing items 191-200 of 211
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ...
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
(
Science in China Press
, 2020 , Article)
The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social networks as its main design element. As one of the most critical components ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
Deep CNN-Based real-time traffic light detector for self-driving vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the unavailability of Vehicle-to-Infrastructure (V2I) communication in current transportation systems, Traffic Light Detection (TLD) is still considered an important module in autonomous vehicles and Driver Assistance ...
System log detection model based on conformal prediction
(
MDPI AG
, 2020 , Article)
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...
Internet of things mobility over information-centric/named-data networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Information-centric networking (ICN) is a content-oriented network that uses content instead of traditional IP addresses, it facilitates the content retrieval and calculates downstream paths without the need of an optimal ...
StabTrust-A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Vehicular Ad-hoc Network (VANET) is a modern era of dynamic information distribution among societies. VANET provides an extensive diversity of applications in various domains, such as Intelligent Transport System (ITS) and ...
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ...
5G vehicular network resource management for improving radio access through machine learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The current cellular technology and vehicular networks cannot satisfy the mighty strides of vehicular network demands. Resource management has become a complex and challenging objective to gain expected outcomes in a ...