Search
Now showing items 201-210 of 224
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ...
Secure Lending: Blockchain and Prospect Theory-Based Decentralized Credit Scoring Model
(
IEEE Computer Society
, 2020 , Article)
Credit scoring is a rigorous statistical analysis carried out by lenders and other third parties to access an individual's creditworthiness. Lenders use credit scoring to estimate the degree of risk in lending money to an ...
Key-policy attribute-based encryption with keyword search in virtualized environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ...
LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The phenomenal increase in the usage of Internet promotes the quality of trust in the scope of Internet of Things (IoT). Trust is beneficial in the provision of an effective, reliable, scalable, and trustworthy environment ...
Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Internet of Things (IoT) systems have been playing a significant role in improving the quality of various applications and services. With the expansion increase of loT devices and users, different Multiple Access (MA) ...
Outlier detection approaches based on machine learning in the internet-of-things
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Outlier detection in the Internet of Things (IoT) is an essential challenge issue studied in numerous fields, including fraud monitoring, intrusion detection, secure localization, trust management, and so on. Conventional ...
Machine unlearning: Its need and implementation strategies
(
Association for Computing Machinery
, 2021 , Conference Paper)
Generally when users share information about themselves on some online platforms, they knowingly or unknowingly allow this data to be used by the companies behind these companies for various purposes including selling this ...
Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of communication technologies, vehicular network applications have evolved from basic traffic safety and efficiency applications to information and entertainment applications. The implementation of ...
Deep Reinforcement Learning for Real-Time Trajectory Planning in UAV Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Proceedings)
In Unmanned Aerial Vehicle (UAV)-enabled wireless powered sensor networks, a UAV can be employed to charge the ground sensors remotely via Wireless Power Transfer (WPT) and collect the sensory data. This paper focuses on ...
Scratch-Rec: a novel Scratch recommendation approach adapting user preference and programming skill for enhancing learning to program
(
Springer
, 2022 , Article)
Among teenagers, online programming learning platforms, such as Scratch, have obtained promising achievements for guiding beginners. However, with the ever-growing number of users, there is an urgent issue that learners ...