A computation offloading method over big data for IoT-enabled cloud-edge computing

X Xu, Q Liu, Y Luo, K Peng, X Zhang, S Meng… - Future Generation …, 2019 - Elsevier
The Internet of mobile things is a burgeoning technique that generates, stores and
processes big real-time data to render rich services for mobile users. In order to mitigate …

Real-time lateral movement detection based on evidence reasoning network for edge computing environment

Z Tian, W Shi, Y Wang, C Zhu, X Du… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Edge computing provides high-class intelligent services and computing capabilities at the
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …

TR‐IDS: Anomaly‐based intrusion detection through text‐convolutional neural network and random forest

E Min, J Long, Q Liu, J Cui… - Security and …, 2018 - Wiley Online Library
As we head towards the IoT (Internet of Things) era, protecting network infrastructures and
information security has become increasingly crucial. In recent years, Anomaly‐Based …

An IoT-oriented data placement method with privacy preservation in cloud environment

X Xu, S Fu, L Qi, X Zhang, Q Liu, Q He, S Li - Journal of Network and …, 2018 - Elsevier
Abstract IoT (Internet of Things) devices generate huge amount of data which require rich
resources for data storage and processing. Cloud computing is one of the most popular …

[PDF][PDF] Cyber security and privacy issues in industrial internet of things.

NZ Jhanjhi, M Humayun… - … Systems Science & …, 2021 - cdn.techscience.cn
The emergence of industry 4.0 stems from research that has received a great deal of
attention in the last few decades. Consequently, there has been a huge paradigm shift in the …

A real-time correlation of host-level events in cyber range service for smart campus

Z Tian, Y Cui, L An, S Su, X Yin, L Yin, X Cui - IEEE Access, 2018 - ieeexplore.ieee.org
Smart campus is an exciting, new, and emerging research area that uses technology and
infrastructure to support and improve its processes in campus services, teaching, learning …

A heuristic evolutionary algorithm of UAV path planning

Z Fu, J Yu, G **e, Y Chen, Y Mao - … and Mobile Computing, 2018 - Wiley Online Library
With the rapid development of the network and the informatization of society, how to improve
the accuracy of information is an urgent problem to be solved. The existing method is to use …

An efficient image matching algorithm based on adaptive threshold and RANSAC

H Li, J Qin, X **ang, L Pan, W Ma, NN **ong - Ieee Access, 2018 - ieeexplore.ieee.org
The education plays a more and more important role in disseminating knowledge because
of the explosive growth of knowledge. As one kind of carrier delivering knowledge, image …

A lightweight three-factor Anonymous authentication scheme with privacy protection for personalized healthcare applications

M Shuai, N Yu, H Wang, L **ong, Y Li - Journal of Organizational …, 2021 - igi-global.com
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted
lots of attention in both academia and industry due to the sensitiveness of medical system. In …

[PDF][PDF] A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.

Z **a, L Lu, T Qiu, HJ Shim, X Chen… - Computers, Materials & …, 2019 - cdn.techscience.cn
Content based image retrieval (CBIR) techniques have been widely deployed in many
applications for seeking the abundant information existed in images. Due to large amounts …