Search
Now showing items 21-30 of 95
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
(
Association for Computing Machinery
, 2022 , Article)
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
A co-design-based reliable low-latency and energy-efficient transmission protocol for uwsns
(
MDPI AG
, 2020 , Article)
Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. ...
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
(
Elsevier B.V.
, 2021 , Article)
Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ...
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ...
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
(
IEEE Computer Society
, 2021 , Other)
5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...
System log detection model based on conformal prediction
(
MDPI AG
, 2020 , Article)
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ...
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of information and communication technologies in smart grid, peer-to-peer (P2P) energy trading for distributed energy resources (DER) has achieved an efficient two-way flow of information and power. ...