Computer Science & Engineering: Recent submissions
Now showing items 921-940 of 2402
-
Identification of phantom movements with an ensemble learning approach
( Elsevier , 2022 , Article)Phantom limb pain after amputation is a debilitating condition that negatively affects activities of daily life and the quality of life of amputees. Most amputees are able to control the movement of the missing limb, which ... -
Metamorphic relation automation: Rationale, challenges, and solution directions
( John Wiley and Sons Ltd , 2022 , Article Review)Metamorphic testing addresses the issue of the oracle problem by comparing results transformation from multiple test executions. The relationship that governs the output transformation is called metamorphic relation. ... -
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ... -
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data
( Elsevier B.V. , 2020 , Article)The voluminous amount of data generated by individuals’ mobile sensors and wearable devices is considered of a great value for the benefits of patients and clinical research. Recent advances incorporating data mining and ... -
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users with Imperfect CSI
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this paper, we propose, an energy-efficient resource allocation scheme for simultaneous wireless information and power transfer (SWIPT)-Non-orthogonal multiple access (NOMA) based femtocell users with imperfect channel ... -
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ... -
An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile ... -
Inaugural Editorial
( John Wiley and Sons Inc , 2020 , Article)The fundamental research of Bennett and Brassard has emerged as a key work when considering the development of the principles of quantum cryptography and communication. The exploration of quantum cryptography is considered ... -
A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting ... -
Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Unmanned aerial vehicles (UAVs) have played an important role in air-ground integration network. Especially in Internet of Things (IoT) services, UAV equipped with communication equipments is widely adopted as a mobile ... -
Ant-Colony-Based Complete-Coverage Path-Planning Algorithm for Underwater Gliders in Ocean Areas with Thermoclines
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Underwater gliders are being increasingly used for data collection, and the development of methods for optimizing their routes has become a topic of active research. With this aim in mind, in this paper, a complete-coverage ... -
Joint user association and resource allocation in HetNets based on user mobility prediction
( Elsevier B.V. , 2020 , Article)Virtual small cell (VSC) formed by directional beams is seen as an alternative for the small base station (SBS) within the coverage of macro base station (MBS), to increase system capacity and reduce site cost. However, ... -
A blockchain-based architecture for secure vehicular Named Data Networks
( Elsevier Ltd , 2020 , Article)In vehicular networks, vehicles exchange a massive amount of information aiming at improving people's safety. Most of this information is personal or sensitive in nature, which makes security and privacy indispensable ... -
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ... -
Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)To introduce the opportunities brought by plug-in hybrid electric vehicles (PHEVs) to the energy Internet, we propose a local vehicle-to-vehicle (V2V) energy trading architecture based on fog computing in social hotspots ... -
Secure Lending: Blockchain and Prospect Theory-Based Decentralized Credit Scoring Model
( IEEE Computer Society , 2020 , Article)Credit scoring is a rigorous statistical analysis carried out by lenders and other third parties to access an individual's creditworthiness. Lenders use credit scoring to estimate the degree of risk in lending money to an ... -
A Differentially Private Big Data Nonparametric Bayesian Clustering Algorithm in Smart Grid
( IEEE Computer Society , 2020 , Article)Smart systems, including smart grid (SG) and Internet of Things (IoT), have been playing a critical role in addressing contemporary issues. Taking full advantage of the big data generated by the smart grid can enhance the ... -
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
( Elsevier B.V. , 2020 , Article)Information-Centric Networking (ICN) is a novel future network architecture which in contrast to IP-based networks relies on content and its name. It separates the physical location of data from the discovery and forwarding ... -
Accountable credential management system for vehicular communication
( Elsevier Inc. , 2020 , Article)Social Internet of Vehicles (SIoV) is becoming a reality where private and secure communication is a prerequisite. Various standardization organizations and studies have reached a consensus to use Vehicular Public-key ...