Towards energy efficiency in the internet of wearable things: A systematic review
Personal mobile devices such as smartwatches, smart jewelry, and smart clothes have
launched a new trend in the Internet of Things (IoT) era, namely the Internet of Wearable …
launched a new trend in the Internet of Things (IoT) era, namely the Internet of Wearable …
Statistical tools and methodologies for ultrareliable low-latency communication—a tutorial
Ultrareliable low-latency communication (URLLC) constitutes a key service class of the fifth
generation (5G) and beyond cellular networks. Notably, designing and supporting URLLC …
generation (5G) and beyond cellular networks. Notably, designing and supporting URLLC …
Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks
Abstract The Internet of Vehicles (IoV) is employed to gather real-time traffic information for
drivers, and base stations in 5G systems are used to assist in traffic data transmission. For …
drivers, and base stations in 5G systems are used to assist in traffic data transmission. For …
A visually secure image encryption scheme based on semi-tensor product compressed sensing
In traditional compressed sensing (CS), the measurement matrix always faces problems
such as large data storage, high memory usage and a large amount of data calculation. To …
such as large data storage, high memory usage and a large amount of data calculation. To …
A robust image encryption algorithm based on Chua's circuit and compressive sensing
In terms of Chua's circuit system, compressive sensing (CS) and Haar wavelet, a novel
image compression-encryption scheme (CES) is proposed in this paper. Firstly, the plaintext …
image compression-encryption scheme (CES) is proposed in this paper. Firstly, the plaintext …
An asymmetric image encryption algorithm based on a fractional-order chaotic system and the RSA public-key cryptosystem
G Ye, K Jiao, H Wu, C Pan, X Huang - International Journal of …, 2020 - World Scientific
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a
fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a …
fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a …
Colour light field image encryption based on DNA sequences and chaotic systems
The light field image (LFI) information includes the intensity of the collected object and the
direction of the light through recording. An LFI with a 4-D scene representation includes a 2 …
direction of the light through recording. An LFI with a 4-D scene representation includes a 2 …
Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing
In the age of the industrial big data, there are several significant problems such as high-
overhead data acquisition, data privacy leakage, and data tampering. Fog computing …
overhead data acquisition, data privacy leakage, and data tampering. Fog computing …
Blockchain enabled anonymous privacy-preserving authentication scheme for internet of health things
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in
wireless communications, integrated devices and embedded system technologies. In the …
wireless communications, integrated devices and embedded system technologies. In the …
An image encryption scheme based on block compressed sensing and Chen's system
Y Luo, Y Liang, S Zhang, J Liu, F Wang - Nonlinear Dynamics, 2023 - Springer
Image encryption is a common way of information protection. However, most of the existing
image encryption schemes have a low transmission efficiency and large memory …
image encryption schemes have a low transmission efficiency and large memory …