Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

[HTML][HTML] Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets

A Nazir, J He, N Zhu, A Wajahat, X Ma, F Ullah… - Journal of King Saud …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has transformed many aspects of modern life, from
healthcare and transportation to home automation and industrial control systems. However …

A regularized cross-layer ladder network for intrusion detection in industrial internet of things

J Long, W Liang, KC Li, Y Wei… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As part of Big Data trends, the ubiquitous use of the Internet of Things (IoT) in the industrial
environment has generated a significant amount of network traffic. In this type of IoT …

Blockchain-based collaborative edge intelligence for trustworthy and real-time video surveillance

M Zhang, J Cao, Y Sahni, Q Chen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Trustworthy and real-time video surveillance aims to analyze the live camera streams in a
privacy-preserving manner for the decision-making of various advanced services, such as …

Artificial intelligence in the IoT era: A review of edge AI hardware and software

T Sipola, J Alatalo, T Kokkonen… - 2022 31st Conference …, 2022 - ieeexplore.ieee.org
The modern trend of moving artificial intelligence computation near to the origin of data
sources has increased the demand for new hardware and software suitable for such …

How to mitigate DDoS intelligently in SD-IoV: A moving target defense approach

T Zhang, C Xu, P Zou, H Tian, X Kuang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Software defined Internet of Vehicles (SD-IoV) is an emerging paradigm for accomplishing
Industrial Internet of Things (IIoT). Unfortunately, SD-IoV still faces security challenges …

A visually secure image encryption based on the fractional Lorenz system and compressive sensing

H Ren, S Niu, J Chen, M Li, Z Yue - Fractal and Fractional, 2022 - mdpi.com
Recently, generating visually secure cipher images by compressive sensing (CS)
techniques has drawn much attention among researchers. However, most of these …

BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment

H Gao, S Luo, Z Ma, X Yan, Y Xu - … and Mobile Computing, 2021 - Wiley Online Library
Due to capacity limitations, large amounts of data generated by IoT devices are often stored
on cloud servers. These data are usually encrypted to prevent the disclosure, which …

DSMN: An improved recommendation model for capturing the multiplicity and dynamics of consumer interests

P Lv, Z Guan, Q Zhang, J Gu, S Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Electronic shop** has become an important way of shop** in our daily life. A good
recommendation system can greatly improve the consumer shop** experience through …

Spectral information guidance network for tampering localization of high-resolution satellite map

X Ding, Y Nie - Expert Systems with Applications, 2025 - Elsevier
Remote-sensing satellite-maps play an attractive and important issue in remote sensing
applications, which are widely applied in monitoring, managing, and kee** track of natural …