Search
Now showing items 131-135 of 135
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Adversarial Attacks for Image Segmentation on Multiple Lightweight Models
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide range of applications in many key areas. However, in recent years, it was found that some adversarial samples easily fool the ...
An automated refactoring approach to improve IoT software quality
(
MDPI AG
, 2020 , Article)
Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way. How to ensure ...
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach
(
Elsevier B.V.
, 2019 , Article)
Nowadays, with the rapid development and wide application of Internet of Things technology, Industrial Internet of Things (IIoT) has become an essential part of industrial systems. A large number of IoT devices has enabled ...