Search
Now showing items 21-30 of 55
Hierarchical Federated Learning over HetNets enabled by Wireless Energy Transfer
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Training centralized machine learning (ML) models becomes infeasible in wireless networks due to the increasing number of internet of things (IoT) and mobile devices and the prevalence of the learning algorithms to adapt ...
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...
Intelligent cooperative health emergency response system in autonomous vehicles
(
IEEE Computer Society
, 2021 , Conference Paper)
Recent technological advances have reshaped many aspects of our lives, especially modern transportation systems. For instance, AI and B5G Networks have raised the level of automation as autonomous vehicles (AV) become ...
NOMA-based Joint Allocation and Offloading Strategy of Communication and Computing Resources
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
This paper proposes an offloading strategy for communication resources and computing resources. Based on the communication background of NOMA, this strategy combines D2D communication and cellular mobile communication to ...
Smart stock exchange market: A secure predictive decentralized model
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Outlier detection approaches based on machine learning in the internet-of-things
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Outlier detection in the Internet of Things (IoT) is an essential challenge issue studied in numerous fields, including fraud monitoring, intrusion detection, secure localization, trust management, and so on. Conventional ...
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ...
Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Internet of Things (IoT) systems have been playing a significant role in improving the quality of various applications and services. With the expansion increase of loT devices and users, different Multiple Access (MA) ...