بحث بسيط
السجلات المعروضة 1 -- 10 من 78
A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network
(
MDPI
, 2020 , Article)
Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ...
An incentive mechanism for data sharing based on blockchain with smart contracts
(
Elsevier
, 2020 , Article)
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ...
TamForen: A tamper-proof cloud forensic framework
(
John Wiley and Sons Inc
, 2022 , Article)
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ...
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ...
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Internet of Things (IoT) connects massive physical devices to capture and collect useful data, which are used to make accurate decisions by taking advantage of the machine learning techniques. However, the collected data ...
QoS provision for vehicle big data by parallel transmission based on heterogeneous network characteristics prediction
(
Academic Press Inc.
, 2022 , Article)
Multipath parallel transmission has become an important research direction to improve big data transmission efficiency of connected vehicles. However, due to the heterogeneity and time-varying characteristics of parallel ...
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
(
Association for Computing Machinery
, 2022 , Article)
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems
(
John Wiley and Sons Ltd
, 2022 , Article)
Modern communication and computing technology is the basic support of the industrial intelligent systems (IIS). As a key component of IIS, the smart port is essential to be offered low-complexity and high-reliability ...
A Practical Cross Device Federated Learning Frame-work over 5G N etworks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The concept of federated learning (FL) was first proposed by Google in 2016. Thereafter, FL has been widely studied for the feasibility of application in various fields due to its potential to make full use of data without ...
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
(
IEEE Computer Society
, 2022 , Article)
The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ...