Research review for broad learning system: Algorithms, theory, and applications
In recent years, the appearance of the broad learning system (BLS) is poised to
revolutionize conventional artificial intelligence methods. It represents a step toward building …
revolutionize conventional artificial intelligence methods. It represents a step toward building …
When energy trading meets blockchain in electrical power system: The state of the art
With the rapid growth of renewable energy resources, energy trading has been shifting from
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
the centralized manner to distributed manner. Blockchain, as a distributed public ledger …
CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT …
A distributed deep learning system for web attack detection on edge devices
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …
devices and sensors transmit huge amounts of data to cloud data centers for further …
Block-DEF: A secure digital evidence framework using blockchain
A secure digital evidence system should ensure that evidence cannot be tampered with and
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
that private information cannot be leaked. Blockchain, a distributed tamper-resistant and …
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …
Real-time lateral movement detection based on evidence reasoning network for edge computing environment
Edge computing provides high-class intelligent services and computing capabilities at the
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
edge of the networks. The aim is to ease the backhaul impacts and offer an improved user …
Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory
Conducting reputation management is very important for Internet of vehicles. However, most
of the existing work evaluate the effectiveness of their schemes with settled attacking …
of the existing work evaluate the effectiveness of their schemes with settled attacking …
Consortium blockchain-based malware detection in mobile devices
To address the problem of detecting malicious codes in malware and extracting the
corresponding evidences in mobile devices, we construct a consortium blockchain …
corresponding evidences in mobile devices, we construct a consortium blockchain …
Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles
Trust management of the Internet of Connected Vehicles has been a hot topic in recent
years with the rapid development of UGV technologies. However, existing resolutions based …
years with the rapid development of UGV technologies. However, existing resolutions based …