Search
Now showing items 21-30 of 36
A Two-Tier Collection and Processing Scheme for Fog-Based Mobile Crowdsensing in the Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In view of the rapid development of the Internet of Vehicles (IoV) and wireless communication technology, intelligent transportation systems play an important role in improving urban road safety, promoting the behavioral ...
STAC: a spatio-temporal approximate method in data collection applications
(
Elsevier B.V.
, 2021 , Article)
Wireless sensor networks (WSNs) and IoT are often deployed for long-term monitoring. However, the network lifetime of these applications is limited by non-rechargeable battery-powered. To vastly reduce energy consumption, ...
IoT root union: A decentralized name resolving system for IoT based on blockchain
(
Elsevier Ltd
, 2021 , Article)
A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ...
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ...
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
(
Elsevier Ltd
, 2021 , Article)
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ...
A Blockchain-Based Storage System with Financial Incentives for Load-balancing
(
IEEE Computer Society
, 2021 , Article)
Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to ...
A sentence-level text adversarial attack algorithm against IIoT based smart grid
(
Elsevier B.V.
, 2021 , Article)
With the development of data processing technologies, efficiency of information processing in the Industrial Internet of Things (IIoT) is greatly improved. In this situation solving the following security problems of the ...