Search
Now showing items 21-30 of 103
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
(
Association for Computing Machinery
, 2022 , Article)
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems
(
John Wiley and Sons Ltd
, 2022 , Article)
Modern communication and computing technology is the basic support of the industrial intelligent systems (IIS). As a key component of IIS, the smart port is essential to be offered low-complexity and high-reliability ...
A Practical Cross Device Federated Learning Frame-work over 5G N etworks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The concept of federated learning (FL) was first proposed by Google in 2016. Thereafter, FL has been widely studied for the feasibility of application in various fields due to its potential to make full use of data without ...
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
(
IEEE Computer Society
, 2022 , Article)
The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ...
Improve the reliability of 6G vehicular communication through skip network coding
(
Elsevier Inc.
, 2022 , Article)
One important design goal of 6G networks is adapting to complex heterogeneous scenarios and providing a stable and reliable transmission channel for specific applications such as vehicular communication. To achieve this, ...
Epidemic Risk Assessment by a Novel Communication Station Based Method
(
IEEE Computer Society
, 2022 , Article)
The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ...
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
An Energy-Efficient In-Network Computing Paradigm for 6G
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored ...
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ...
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ...