Search
Now showing items 71-80 of 87
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
(
Elsevier B.V.
, 2022 , Article)
Federated Learning (FL) is a distributed learning methodology that allows multiple nodes to cooperatively train a deep learning model, without the need to share their local data. It is a promising solution for telemonitoring ...
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication
(
Academic Press
, 2020 , Article)
To support multimedia applications, Mobile Edge Computing (MEC) servers offer storage and computing capacities to handle videos close to end-users. However, the high load in peak hours consumes the limited available bandwidth ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core ...
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ...
Multi-layer security scheme for implantable medical devices
(
Springer
, 2020 , Article)
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ...
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
(
Elsevier Ltd
, 2019 , Article)
With the wide application of Unmanned Aerial Vehicles (UAVs) in production and life, more and more attention has been paid to the autonomous track planning of UAVs. When UAV path planning algorithm is dealing with flying ...
Symmetric encryption relying on chaotic henon system for secure hardware-friendly wireless communication of implantable medical systems
(
MDPI AG
, 2018 , Article)
Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, ...