بحث بسيط
السجلات المعروضة 1 -- 10 من 10
An incentive mechanism for data sharing based on blockchain with smart contracts
(
Elsevier
, 2020 , Article)
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ...
An automated refactoring approach to improve IoT software quality
(
MDPI AG
, 2020 , Article)
Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ...
Efficient and fair Wi-Fi and LTE-U coexistence via communications over content centric networking
(
Elsevier B.V.
, 2020 , Article)
With the increasingly huge mobile traffic, numerous mobile operators try to seek some ways to alleviate the situation, such as expanding the LTE (Long Term Evolution) system into unlicensed spectrums. However, LTE-U (LTE ...
An adaptive network coding scheme for multipath transmission in cellular-based vehicular networks
(
MDPI AG
, 2020 , Article)
With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has ...
A co-design-based reliable low-latency and energy-efficient transmission protocol for uwsns
(
MDPI AG
, 2020 , Article)
Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. ...
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ...
System log detection model based on conformal prediction
(
MDPI AG
, 2020 , Article)
With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
An intelligent data uploading selection mechanism for offloading uplink traffic of cellular networks
(
MDPI AG
, 2020 , Article)
Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading ...
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
(
Science in China Press
, 2020 , Article)
The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social networks as its main design element. As one of the most critical components ...