Search
Now showing items 61-70 of 83
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
(
Elsevier Ltd
, 2021 , Article)
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ...
A Blockchain-Based Storage System with Financial Incentives for Load-balancing
(
IEEE Computer Society
, 2021 , Article)
Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to ...
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
(
IEEE Computer Society
, 2020 , Article)
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...
A sentence-level text adversarial attack algorithm against IIoT based smart grid
(
Elsevier B.V.
, 2021 , Article)
With the development of data processing technologies, efficiency of information processing in the Industrial Internet of Things (IIoT) is greatly improved. In this situation solving the following security problems of the ...
BPFL: A Blockchain Based Privacy-Preserving Federated Learning Scheme
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Federated Learning (FL), which allows multiple participants to co-train machine Learning models without exposing local data, has been recognized as a promising method in the past few years. However, in the FL process, the ...
Profit Maximization of Online Service Function Chain Orchestration in an Inter-Datacenter Elastic Optical Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
To meet the increasing traffic demands characterized by large bandwidth and high burstiness, more traffic has been moving to inter-datacenter elastic optical networks (inter-DC EONs) for processing. The integration of two ...
Joint user association and resource allocation in HetNets based on user mobility prediction
(
Elsevier B.V.
, 2020 , Article)
Virtual small cell (VSC) formed by directional beams is seen as an alternative for the small base station (SBS) within the coverage of macro base station (MBS), to increase system capacity and reduce site cost. However, ...