Efficient data access control with fine-grained data protection in cloud-assisted IIoT
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build
digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency …
digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency …
Multi-sink distributed power control algorithm for cyber-physical-systems in coal mine tunnels
A coal mine tunnel usually has a long-strip shape. Traditional single-sink cyber-physical-
systems (CPS) cannot ensure that sensor nodes far from the entrance of a coal mine tunnel …
systems (CPS) cannot ensure that sensor nodes far from the entrance of a coal mine tunnel …
QoS-DPSO: QoS-aware task scheduling for cloud computing system
Dynamic provisioning of computational resources in cloud computing system is a
challenging problem. With many VMs being deployed in clouds, managing so much …
challenging problem. With many VMs being deployed in clouds, managing so much …
Fully convolutional neural network with augmented atrous spatial pyramid pool and fully connected fusion path for high resolution remote sensing image segmentation
Recent developments in Convolutional Neural Networks (CNNs) have allowed for the
achievement of solid advances in semantic segmentation of high-resolution remote sensing …
achievement of solid advances in semantic segmentation of high-resolution remote sensing …
Risk assessment of hypertension in steel workers based on LVQ and fisher-SVM deep excavation
The steel industry is one of the pillar industries in China. The physical and mental health of
steel workers is related to the development of China's steel industry. Steel workers have …
steel workers is related to the development of China's steel industry. Steel workers have …
Software aging analysis of the android mobile os
Mobile devices are significantly complex, feature-rich, and heavily customized, thus they are
prone to software reliability and performance issues. This paper considers the problem of …
prone to software reliability and performance issues. This paper considers the problem of …
Algorithm research of known-plaintext attack on double random phase mask based on WSNs
With the development and popularization of computer and Internet, information
communication plays an irreplaceable role in the modern society. Security problems of the …
communication plays an irreplaceable role in the modern society. Security problems of the …
Testing the resilience of MEC-based IoT applications against resource exhaustion attacks
R Pietrantuono, M Ficco… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) is an emerging computing model that provides the
necessary on-demand resources and services to the edge of the network, ensuring powerful …
necessary on-demand resources and services to the edge of the network, ensuring powerful …
Secure deduplication-based storage systems with resistance to side-channel attacks via fog computing
Data deduplication technique could greatly save the storage overhead of the cloud by
eliminating duplicated data and retaining one copy. In order to ensure the privacy of the data …
eliminating duplicated data and retaining one copy. In order to ensure the privacy of the data …
Adaptive management and multi-objective optimization of virtual machine in cloud computing based on particle swarm optimization
S Li, X Pan - EURASIP Journal on Wireless Communications and …, 2020 - Springer
In order to improve the adaptive management ability of virtual machine placement in cloud
computing, an adaptive management and multi-objective optimization method for virtual …
computing, an adaptive management and multi-objective optimization method for virtual …