Search
Now showing items 1-10 of 22
Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the rapid development of smart cities, various types of sensors can rapidly collect a large amount of data, and it becomes increasingly important to discover effective knowledge and process information from massive ...
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ...
Applying artificial bee colony algorithm to the multidepot vehicle routing problem
(
John Wiley and Sons Ltd
, 2022 , Conference Paper)
With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ...
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
(
IEEE Computer Society
, 2022 , Article)
The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ...
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
(
IEEE Computer Society
, 2022 , Article)
With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
Epidemic Risk Assessment by a Novel Communication Station Based Method
(
IEEE Computer Society
, 2022 , Article)
The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ...
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
An Energy-Efficient In-Network Computing Paradigm for 6G
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored ...
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ...
Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ...