Search
Now showing items 11-20 of 36
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ...
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data
(
Elsevier B.V.
, 2020 , Article)
The voluminous amount of data generated by individuals’ mobile sensors and wearable devices is considered of a great value for the benefits of patients and clinical research. Recent advances incorporating data mining and ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles (IoV) environment, there ...
Blockchain-based incentives for secure and collaborative data sharing in multiple clouds
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data ...
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
A 5G network is the key driving factor in the development of vehicle-to-vehicle (V2V) communication technology, and V2V communication in 5G has recently attracted great interest. In the V2V communication network, users can ...
Key-policy attribute-based encryption with keyword search in virtualized environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ...
IntegrityChain: Provable data possession for decentralized storage
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ...