Search
Now showing items 1-10 of 26
Intersection Fog-Based Distributed Routing for V2V Communication in Urban Vehicular Ad Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the characteristics of urban vehicular ad hoc networks (VANETs), many difficulties exist when designing routing protocols. In this paper, we focus on designing an efficient routing strategy for vehicle-to-vehicle ...
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ...
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data
(
Elsevier B.V.
, 2020 , Article)
The voluminous amount of data generated by individuals’ mobile sensors and wearable devices is considered of a great value for the benefits of patients and clinical research. Recent advances incorporating data mining and ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles (IoV) environment, there ...
Blockchain-based incentives for secure and collaborative data sharing in multiple clouds
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data ...