Search
Now showing items 31-40 of 233
Multidata-Owner Searchable Encryption Scheme over Medical Cloud Data with Efficient Access Control
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Several schemes have been proposed to enable cloud servers to search encrypted medical data to preserve patients' privacy. However, the existing schemes use inefficient attribute-based encryption (ABE) approaches for access ...
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users with Imperfect CSI
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this paper, we propose, an energy-efficient resource allocation scheme for simultaneous wireless information and power transfer (SWIPT)-Non-orthogonal multiple access (NOMA) based femtocell users with imperfect channel ...
QoS provision for vehicle big data by parallel transmission based on heterogeneous network characteristics prediction
(
Academic Press Inc.
, 2022 , Article)
Multipath parallel transmission has become an important research direction to improve big data transmission efficiency of connected vehicles. However, due to the heterogeneity and time-varying characteristics of parallel ...
Protecting Your Shopping Preference with Differential Privacy
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Online banks may disclose consumers' shopping preferences due to various attacks. With differential privacy, each consumer can disturb his consumption amount locally before sending it to online banks. However, directly ...
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
A Differentially Private Classification Algorithm with High Utility for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The advancement of the wireless body area networks (WBAN) and sensor technologies allows us to collect a variety of physiological and behavioral data from human body. And appropriate application of machine learning methods ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
Scratch-Rec: a novel Scratch recommendation approach adapting user preference and programming skill for enhancing learning to program
(
Springer
, 2022 , Article)
Among teenagers, online programming learning platforms, such as Scratch, have obtained promising achievements for guiding beginners. However, with the ever-growing number of users, there is an urgent issue that learners ...
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
With the exponential growth in IoT devices, especially in healthcare systems, where multiple devices are attributed to one person, the need for a secure and effective group secret key (GSK) generation is intrinsic. GSKs ...
Time-Dependent Pricing for Bandwidth Slicing under Information Asymmetry and Price Discrimination
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the bursty nature of Internet traffic, network service providers (NSPs) are forced to expand their network capacity in order to meet the ever-increasing peak-time traffic demand, which is however costly and inefficient. ...