Search
Now showing items 181-190 of 205
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
Online parallelized service function chain orchestration in data center networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, much attention has been focused on deploying service function chains (SFCs), each of which is composed of a set of virtual network functions (VNFs) in a specified order. This is a promising approach for ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...
Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers ...
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ...
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ...
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ...