Search
Now showing items 11-20 of 59
Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ...
RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
While the widespread use of ubiquitously connected devices in Internet of Everything (IoE) offers enormous benefits, it also raises serious privacy concerns. Federated learning, as one of the promising solutions to alleviate ...
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Vehicular Ad hoc Network (VANET) is an enabling technology to provide a variety of convenient services in intelligent transportation systems, and yet vulnerable to various intrusion attacks. Intrusion detection systems ...
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ...
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks
(
IEEE Computer Society
, 2021 , Article)
Ultra-dense mobile networks (UDMNs) represent a promising technology for improving the network performance and providing the ubiquitous network accessibility in the beyond 5 G (B5G) mobile networks. Heterogenous densely ...
Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Mobile-edge computing (MEC) has emerged as a new computing paradigm with great potential to alleviate resource limitations attributed to mobile device users (MDUs) by offloading intensive computations to ubiquitous MEC ...
IoT root union: A decentralized name resolving system for IoT based on blockchain
(
Elsevier Ltd
, 2021 , Article)
A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...
Secure Data Access Control with Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can efficiently control and manage the distributed energy resources (DERs). In smart grid, IoT devices generate huge amounts ...