Security and privacy on 6g network edge: A survey
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …
[HTML][HTML] Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
Abstract The Internet of Things (IoT) has transformed many aspects of modern life, from
healthcare and transportation to home automation and industrial control systems. However …
healthcare and transportation to home automation and industrial control systems. However …
A regularized cross-layer ladder network for intrusion detection in industrial internet of things
As part of Big Data trends, the ubiquitous use of the Internet of Things (IoT) in the industrial
environment has generated a significant amount of network traffic. In this type of IoT …
environment has generated a significant amount of network traffic. In this type of IoT …
Blockchain-based collaborative edge intelligence for trustworthy and real-time video surveillance
Trustworthy and real-time video surveillance aims to analyze the live camera streams in a
privacy-preserving manner for the decision-making of various advanced services, such as …
privacy-preserving manner for the decision-making of various advanced services, such as …
Artificial intelligence in the IoT era: A review of edge AI hardware and software
The modern trend of moving artificial intelligence computation near to the origin of data
sources has increased the demand for new hardware and software suitable for such …
sources has increased the demand for new hardware and software suitable for such …
How to mitigate DDoS intelligently in SD-IoV: A moving target defense approach
Software defined Internet of Vehicles (SD-IoV) is an emerging paradigm for accomplishing
Industrial Internet of Things (IIoT). Unfortunately, SD-IoV still faces security challenges …
Industrial Internet of Things (IIoT). Unfortunately, SD-IoV still faces security challenges …
A visually secure image encryption based on the fractional Lorenz system and compressive sensing
H Ren, S Niu, J Chen, M Li, Z Yue - Fractal and Fractional, 2022 - mdpi.com
Recently, generating visually secure cipher images by compressive sensing (CS)
techniques has drawn much attention among researchers. However, most of these …
techniques has drawn much attention among researchers. However, most of these …
BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
H Gao, S Luo, Z Ma, X Yan, Y Xu - … and Mobile Computing, 2021 - Wiley Online Library
Due to capacity limitations, large amounts of data generated by IoT devices are often stored
on cloud servers. These data are usually encrypted to prevent the disclosure, which …
on cloud servers. These data are usually encrypted to prevent the disclosure, which …
DSMN: An improved recommendation model for capturing the multiplicity and dynamics of consumer interests
P Lv, Z Guan, Q Zhang, J Gu, S Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Electronic shop** has become an important way of shop** in our daily life. A good
recommendation system can greatly improve the consumer shop** experience through …
recommendation system can greatly improve the consumer shop** experience through …
Spectral information guidance network for tampering localization of high-resolution satellite map
X Ding, Y Nie - Expert Systems with Applications, 2025 - Elsevier
Remote-sensing satellite-maps play an attractive and important issue in remote sensing
applications, which are widely applied in monitoring, managing, and kee** track of natural …
applications, which are widely applied in monitoring, managing, and kee** track of natural …