Search
Now showing items 81-90 of 103
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data
(
Elsevier B.V.
, 2020 , Article)
The voluminous amount of data generated by individuals’ mobile sensors and wearable devices is considered of a great value for the benefits of patients and clinical research. Recent advances incorporating data mining and ...
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
IntegrityChain: Provable data possession for decentralized storage
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ...
Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on designing an efficient routing strategy for vehicle-to-vehicle ...
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
A 5G network is the key driving factor in the development of vehicle-to-vehicle (V2V) communication technology, and V2V communication in 5G has recently attracted great interest. In the V2V communication network, users can ...
Blockchain-based incentives for secure and collaborative data sharing in multiple clouds
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data ...
Key-policy attribute-based encryption with keyword search in virtualized environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ...
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
(
Elsevier B.V.
, 2020 , Article)
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ...
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ...