A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B **ao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Influence maximization on social graphs: A survey

Y Li, J Fan, Y Wang, KL Tan - IEEE Transactions on Knowledge …, 2018 - ieeexplore.ieee.org
Influence Maximization (IM), which selects a set of k users (called seed set) from a social
network to maximize the expected number of influenced users (called influence spread), is a …

Prompt-enhanced software vulnerability detection using chatgpt

C Zhang, H Liu, J Zeng, K Yang, Y Li, H Li - … of the 2024 IEEE/ACM 46th …, 2024 - dl.acm.org
With the increase in software vulnerabilities that cause significant economic and social
losses, automatic vulnerability detection has become essential in software development and …

[HTML][HTML] Detection of fake news using deep learning CNN–RNN based methods

IK Sastrawan, IPA Bayupati, DMS Arsa - ICT express, 2022 - Elsevier
Fake news is inaccurate information that is intentionally disseminated for a specific purpose.
If allowed to spread, fake news can harm the political and social spheres, so several studies …

Defensive modeling of fake news through online social networks

G Shrivastava, P Kumar, RP Ojha… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Online social networks (OSNs) have become an integral mode of communication among
people and even nonhuman scenarios can also be integrated into OSNs. The evergrowing …

Cost-efficient strategies for restraining rumor spreading in mobile social networks

Z He, Z Cai, J Yu, X Wang, Y Sun… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the popularity of mobile devices, mobile social networks (MSNs) have become an
important platform for information dissemination. However, the spread of rumors in MSNs …

Minimizing the spread of misinformation in online social networks: A survey

A Zareie, R Sakellariou - Journal of Network and Computer Applications, 2021 - Elsevier
Online social networks provide an opportunity to spread messages and news fast and
widely. One may appreciate the quick spread of legitimate news and messages but …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y **, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …