Computer Science & Engineering: Recent submissions
Now showing items 1101-1120 of 2402
-
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ... -
Federated Deep Actor-Critic-Based Task Offloading in Air-Ground Electricity IoT
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The integration of air-ground electricity internet of things (AGE-IoT) and machine learning, enables flexible network coverage and intelligent task offloading. However, dynamics of AGE-IoT networks, incomplete information, ... -
Energy-Efficient Device Assignment and Task Allocation in Multi-Orchestrator Mobile Edge Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Mobile Edge Learning (MEL) is a decentralized learning paradigm that enables resource-constrained IoT devices to either learn a shared model without sharing the data, or to distribute the learning task with the data to ... -
Fog-Based Conditional Privacy-Preserving Data Batch Verification in Smart Grid
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The smart grid is already widespread for the purpose of managing energy generation and distribution. In this system, frequent interactions between devices generate mass data, which requires robust processing capability. ... -
A distributed gateway selection algorithm for UAV networks
( IEEE Computer Society , 2015 , Article)In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although ... -
Privacy and security issues in online social networks
( MDPI AG , 2018 , Article)The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ... -
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ... -
Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers ... -
Location privacy preservation for mobile users in location-based services
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ... -
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ... -
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ... -
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ... -
Spammer Detection and Fake User Identification on Social Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ... -
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ... -
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ... -
The Internet of Things: A Review of Enabled Technologies and Future Challenges
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article Review)The Internet of Things (IoT) is an emerging classical model, envisioned as a system of billions of small interconnected devices for posing the state-of-the-art findings to real-world glitches. Over the last decade, there ... -
Trust management techniques for the internet of things: A survey
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be ... -
Online parallelized service function chain orchestration in data center networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In recent years, much attention has been focused on deploying service function chains (SFCs), each of which is composed of a set of virtual network functions (VNFs) in a specified order. This is a promising approach for ... -
BPFL: A Blockchain Based Privacy-Preserving Federated Learning Scheme
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Federated Learning (FL), which allows multiple participants to co-train machine Learning models without exposing local data, has been recognized as a promising method in the past few years. However, in the FL process, the ... -
QoS-Aware Reliable Traffic Prediction Model under Wireless Vehicular Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)With the continuous progress of communication quality, the wireless vehicular networks (WVN) will surely be-come an inevitable part of future smart cities. Inside WVN where context is complicated and stochastic, quality ...