Outsourced and privacy-preserving collaborative k-prototype clustering for mixed data via additive secret sharing
Outsourced cloud computing can be considered as an effective way to overcome the data
island among users and relieve the pressure of limited resources. However, due to the …
island among users and relieve the pressure of limited resources. However, due to the …
Security-aware resource allocation scheme based on DRL in cloud-edge-terminal cooperative vehicular network
Virtual network embedding (VNE) refers to the process of map** virtual networks onto
physical networks, which can improve the utilization and flexibility of network resources …
physical networks, which can improve the utilization and flexibility of network resources …
[HTML][HTML] Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities
L Li, C Sun, J Huo, Y Su, L Sun, Y Huang… - Digital Communications …, 2024 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) are gaining increasing attention in many fields,
such as military, logistics, and hazardous site map**. Utilizing UAVs to assist …
such as military, logistics, and hazardous site map**. Utilizing UAVs to assist …
Toward secure and lightweight data transmission for cloud-edge-terminal collaboration in artificial intelligence of things
As one of data sources in cloud–edge–terminal collaboration enabled artificial intelligence
of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal …
of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal …
User Security Oriented Information-Centric IoT Nodes Clustering With Graph Convolution Networks
Information-centric Internet of Things (IoT) sensor networks allow users to access data
directly from the sensing layer. This is done through cluster heads (CHs), which are selected …
directly from the sensing layer. This is done through cluster heads (CHs), which are selected …
Cloud, IoT and Data Science
M Younas, I Awan - Information Systems Frontiers, 2024 - Springer
This special issue has been organized to solicit papers via an open call as well as selected
papers from the 8th International Conference on Future Internet of Things and Cloud …
papers from the 8th International Conference on Future Internet of Things and Cloud …
Q-CSM: Q-Learning-based Cognitive Service Management in Heterogeneous IoT Networks
The dramatic increase in the number of smart services and their diversity poses a significant
challenge in Internet of Things (IoT) networks: heterogeneity. This causes significant quality …
challenge in Internet of Things (IoT) networks: heterogeneity. This causes significant quality …
An intelligent signal processing method against impulsive noise interference in AIoT
B Wang, Z Jiang, Y Sun, Y Chen - EURASIP Journal on Advances in …, 2023 - Springer
In complex industrial environments such as the Internet of Things in coal mines, large
mechanical and electrical equipment can generate powerful impulsive noise, which can …
mechanical and electrical equipment can generate powerful impulsive noise, which can …
Ensemble Learning-based Traffic Classification with Small-Scale Datasets for Wireless Networks
X Wang, W Wei, X Yu, D Zheng… - IEEE INFOCOM 2024 …, 2024 - ieeexplore.ieee.org
Traffic classification is an essential part of intelligent network management in Fifth
generation (5G) networks, from quality of service guarantees to security monitoring. With the …
generation (5G) networks, from quality of service guarantees to security monitoring. With the …
A Probabilistic and Distributed Validation Framework Based on Blockchain for Artificial Intelligence of Things
H Bao, Y Zhao, X Zhang, G Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Artificial Intelligence of Things (AIoT) applications have advanced rapidly. However, most of
them are inherently vulnerable to security threats and may be the source of spoofing attacks …
them are inherently vulnerable to security threats and may be the source of spoofing attacks …