Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Classification of resource management approaches in fog/edge paradigm and future research prospects: a systematic review
The fog paradigm extends the cloud capabilities at the edge of the network. Fog computing-
based real-time applications (Online gaming, 5G, Healthcare 4.0, Industrial IoT, autonomous …
based real-time applications (Online gaming, 5G, Healthcare 4.0, Industrial IoT, autonomous …
S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks
Fog computing aims to provide resources to cloud data centers at the network's edge to
support time-critical Internet of Things (IoT) applications with low-latency requirements …
support time-critical Internet of Things (IoT) applications with low-latency requirements …
Wearable Sensor‐Based Human Activity Recognition Using Hybrid Deep Learning Techniques
H Wang, J Zhao, J Li, L Tian, P Tu… - Security and …, 2020 - Wiley Online Library
Human activity recognition (HAR) can be exploited to great benefits in many applications,
including elder care, health care, rehabilitation, entertainment, and monitoring. Many …
including elder care, health care, rehabilitation, entertainment, and monitoring. Many …
A blockchain based federated learning for message dissemination in vehicular networks
Message exchange among vehicles plays an important role in ensuring road safety.
Emergency message dissemination is usually carried out by broadcasting. However, high …
Emergency message dissemination is usually carried out by broadcasting. However, high …
Dependable scheduling for real-time workflows on cyber–physical cloud systems
Cyber-physical cloud systems (CPCS) are integrations of cyber-physical systems (CPS) and
cloud computing infrastructures. Integrating CPS into cloud computing infrastructures could …
cloud computing infrastructures. Integrating CPS into cloud computing infrastructures could …
Privacy-aware cross-platform service recommendation based on enhanced locality-sensitive hashing
Recommender systems are a promising way for users to quickly find the valuable
information that they are interested in from massive data. Concretely, by capturing the user's …
information that they are interested in from massive data. Concretely, by capturing the user's …
Task scheduling in the internet of things: challenges, solutions, and future trends
T Bu, Z Huang, K Zhang, Y Wang, H Song, J Zhou… - Cluster …, 2024 - Springer
Abstract The Internet of Things (IoT) paradigm, by transforming physical devices into
innovative items, affects every aspect of our daily lives. It has brought a slew of evolutionary …
innovative items, affects every aspect of our daily lives. It has brought a slew of evolutionary …
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …
Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform …
CPSS LR-DDoS detection and defense in edge computing utilizing DCNN Q-learning
Z Liu, X Yin, Y Hu - IEEE Access, 2020 - ieeexplore.ieee.org
Existing intrusion detection and defense models for CPSS (Cyber-Physical-Social Systems)
are based on analyzing the static intrusion characteristics, which cannot effectively detect …
are based on analyzing the static intrusion characteristics, which cannot effectively detect …
An efficient and secure model using adaptive optimal deep learning for task scheduling in cloud computing
Recently, cloud computing resources have become one of the trending technologies that
permit the user to manage diverse resources and a huge amount of data in the cloud. Task …
permit the user to manage diverse resources and a huge amount of data in the cloud. Task …