Matching large-scale biomedical ontologies with central concept based partitioning algorithm and adaptive compact evolutionary algorithm

X Xue, J Zhang - Applied Soft Computing, 2021 - Elsevier
As a unified model for describing biomedical knowledge, a biomedical ontology is of help to
solve the issues of data heterogeneity in different biomedical databases. However, these …

Attacks and Solutions for a Two‐Factor Authentication Protocol for Wireless Body Area Networks

CM Chen, Z Li, SA Chaudhry… - Security and …, 2021 - Wiley Online Library
As an extension of the 4G system, 5G is a new generation of broadband mobile
communication with high speed, low latency, and large connection characteristics. It solves …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …

A provably secure three‐factor authentication protocol for wireless sensor networks

TY Wu, L Yang, Z Lee, SC Chu… - Wireless …, 2021 - Wiley Online Library
The wireless sensor network is a network composed of sensor nodes self‐organizing
through the application of wireless communication technology. The application of wireless …

Generative adversarial learning for optimizing ontology alignment

X Xue, Q Huang - Expert Systems, 2023 - Wiley Online Library
The edge computing in knowledge‐defined network (KDN) is a kind of distributed computing
architecture, and the format of edge resources stored in different edge computing nodes are …

Matching sensor ontologies with multi-context similarity measure and parallel compact differential evolution algorithm

X Xue, C Jiang - IEEE Sensors Journal, 2021 - ieeexplore.ieee.org
Sensor ontology is able to resolve the sensor data heterogeneity issue among the Cybertwin-
driven 6G based Internet of Everything (IoE) systems. However, due to human subjectivity …

[HTML][HTML] SAKAP: SGX-based authentication key agreement protocol in IoT-enabled cloud computing

TY Wu, L Wang, X Guo, YC Chen, SC Chu - Sustainability, 2022 - mdpi.com
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used
in people's daily lives. As the number of IoT devices increases, the amount of data to be …

Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

TY Wu, F Kong, Q Meng, S Kumari… - EURASIP Journal on …, 2023 - Springer
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …

Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment.

TY Wu, Q Meng, L Yang, S Kumari… - … -Computer Modeling in …, 2023 - search.ebscohost.com
The development of the Internet of Things has facilitated the rapid development of various
industries. With the improvement in people's living standards, people's health requirements …

Research on dynamic path planning of mobile robot based on improved DDPG algorithm

P Li, X Ding, H Sun, S Zhao… - Mobile Information Systems, 2021 - Wiley Online Library
Aiming at the problems of low success rate and slow learning speed of the DDPG algorithm
in path planning of a mobile robot in a dynamic environment, an improved DDPG algorithm …