[HTML][HTML] A review of intelligent connected vehicle cooperative driving development

B Wang, Y Han, S Wang, D Tian, M Cai, M Liu, L Wang - Mathematics, 2022 - mdpi.com
With the development and progress of information technology, especially V2X technology,
the research focus of intelligent vehicles gradually shifted from single-vehicle control to multi …

Swarm intelligence for next-generation networks: Recent advances and applications

QV Pham, DC Nguyen, S Mirjalili, DT Hoang… - Journal of Network and …, 2021 - Elsevier
In next-generation networks (NGN), a very large number of devices and applications are
emerged, along with the heterogeneity of technologies, architectures, mobile data, etc., and …

Selecting critical features for data classification based on machine learning methods

RC Chen, C Dewi, SW Huang, RE Caraka - Journal of Big Data, 2020 - Springer
Feature selection becomes prominent, especially in the data sets with many variables and
features. It will eliminate unimportant variables and improve the accuracy as well as the …

Decentralized autonomous organizations: Concept, model, and applications

S Wang, W Ding, J Li, Y Yuan… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Decentralized autonomy is a long-standing research topic in information sciences and social
sciences. The self-organization phenomenon in natural ecosystems, the Cyber Movement …

Multi-sink distributed power control algorithm for cyber-physical-systems in coal mine tunnels

W Wei, X **a, M Wozniak, X Fan, R Damaševičius… - Computer Networks, 2019 - Elsevier
A coal mine tunnel usually has a long-strip shape. Traditional single-sink cyber-physical-
systems (CPS) cannot ensure that sensor nodes far from the entrance of a coal mine tunnel …

Review of object instance segmentation based on deep learning

D Tian, Y Han, B Wang, T Guan… - Journal of Electronic …, 2022 - spiedigitallibrary.org
As a challenging task in computer vision, instance segmentation has attracted extensive
attention in recent years. Able to obtain very rich and refined object information, this …

Research overview on edge detection algorithms based on deep learning and image fusion

B Tian, W Wei - Security and Communication Networks, 2022 - Wiley Online Library
Edge detection is a boundary‐based segmentation method to extract important information
from an image, and it is a research hotspot in the fields of computer vision and image …

[Retracted] Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm

M Chen - Complexity, 2021 - Wiley Online Library
With the application of computer and network technology in the field of accounting, the
development of accounting informationization is an inevitable trend, and the construction of …

Privacy-preserving bilateral multi-receiver matching with revocability for mobile social networks

A Wu, D Feng, M Zhang, A Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Mobile social networks (MSNs) offer convenient and ubiquitous services to expand social
circles, share information, etc. These services require strict security measures to prevent the …

Secure and lightweight blockchain-based truthful data trading for real-time vehicular crowdsensing

H Xu, S Qi, Y Qi, W Wei, N **ong - ACM Transactions on Embedded …, 2024 - dl.acm.org
As the number of smart cars grows rapidly, vehicular crowdsensing (VCS) is gradually
becoming popular. In a VCS infrastructure, sensing devices and computing units hold on …