Search
Now showing items 11-20 of 34
Adversarial samples on android malware detection systems for IoT systems
(
MDPI AG
, 2019 , Article)
Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has ...
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ...
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ...
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD ...
Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Nowadays, Implantable Medical Devices (IMDs) rely mainly on wireless technology for information exchange. In spite of the many advantages wireless technology offers to patients in terms of efficiency, speed and ease; it ...
Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ...
Optimal energy trading for plug-in hybrid electric vehicles based on fog computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A large number of plug-in hybrid electric vehicles (PHEVs) have high mobility but a small battery capacity; thus, these vehicles urgently need to make charging and discharging decisions in real time. This paper proposes a ...
A fog computing solution for context-based privacy leakage detection for android healthcare devices
(
MDPI AG
, 2019 , Article)
Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their ...
A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing
(
MDPI AG
, 2019 , Article)
The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles’ speed information is an effective way to monitor the traffic ...
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
(
NLM (Medline)
, 2019 , Article)
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ...