بحث بسيط
السجلات المعروضة 21 -- 30 من 83
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
(
IEEE Computer Society
, 2021 , Other)
5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...
System log detection model based on conformal prediction
(
MDPI AG
, 2020 , Article)
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of information and communication technologies in smart grid, peer-to-peer (P2P) energy trading for distributed energy resources (DER) has achieved an efficient two-way flow of information and power. ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ...
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data
(
Elsevier B.V.
, 2020 , Article)
The voluminous amount of data generated by individuals’ mobile sensors and wearable devices is considered of a great value for the benefits of patients and clinical research. Recent advances incorporating data mining and ...
An Efficient Network Coding Scheme for Heterogeneous Wireless Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
As the demand of mobile services for high bandwidth grows, aggregation of various wireless network resources in hybrid communication system becomes a trend. Network coding has been widely studied to solve the packet ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...