A survey of compiler testing

J Chen, J Patra, M Pradel, Y **ong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Block design-based key agreement for group data sharing in cloud computing

J Shen, T Zhou, D He, Y Zhang, X Sun… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …

Big data analytics for large-scale wireless networks: Challenges and opportunities

HN Dai, RCW Wong, H Wang, Z Zheng… - ACM Computing …, 2019 - dl.acm.org
The wide proliferation of various wireless communication systems and wireless devices has
led to the arrival of big data era in large-scale wireless networks. Big data of large-scale …

Multipath cooperative routing with efficient acknowledgement for LEO satellite networks

F Tang, H Zhang, LT Yang - IEEE Transactions on Mobile …, 2018 - ieeexplore.ieee.org
Multipath routing can significantly improve the network throughput and end-to-end (e2e)
delay. Network coding based multipath routing removes the complicated coordination …

Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing

L Zhang, M Peng, W Wang, Z **, Y Su… - Transactions on …, 2021 - Wiley Online Library
With the rapid development of Internet of Things (IoT) technology, IoT devices have been
widely used to collect physiological health data and provide diversified services to the …

Identity-based data outsourcing with comprehensive auditing in clouds

Y Wang, Q Wu, B Qin, W Shi… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage system provides facilitative file storage and sharing services for distributed
clients. To address integrity, controllable outsourcing, and origin auditing concerns on …

[HTML][HTML] Homomorphic encryption and network coding in iot architectures: Advantages and future challenges

G Peralta, RG Cid-Fuentes, J Bilbao, PM Crespo - Electronics, 2019 - mdpi.com
The introduction of the Internet of Things (IoT) is creating manifold new services and
opportunities. This new technological trend enables the connection of a massive number of …

A secure content caching scheme for disaster backup in fog computing enabled mobile social networks

Z Su, Q Xu, J Luo, H Pu, Y Peng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Caching content with fog computing at the edge nodes has been a promising alternative to
mitigate burdens of backbone networks and improve mobile users' quality of experience in …

Privacy protection for internet of drones: A network coding approach

YJ Chen, LC Wang - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
This paper proposes an enhanced secure pseudonym scheme to protect the privacy of
cloud data in Internet of Drones (IoD). Nowadays, drones equipped with cameras can …