New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy

DG Zhang, CH Ni, J Zhang, T Zhang… - Future Generation …, 2023 - Elsevier
With the rapid development of the Internet of Vehicles, at the same time, due to the limited
storage space of vehicles and more and more data requirements, vehicles need more and …

Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment

L Qi, C Hu, X Zhang, MR Khosravi… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
As one of the cyber–physical–social systems that plays a key role in people's daily activities,
a smart city is producing a considerable amount of industrial data associated with …

Practical federated gradient boosting decision trees

Q Li, Z Wen, B He - Proceedings of the AAAI conference on artificial …, 2020 - aaai.org
Abstract Gradient Boosting Decision Trees (GBDTs) have become very successful in recent
years, with many awards in machine learning and data mining competitions. There have …

Big data cleaning based on mobile edge computing in industrial sensor-cloud

T Wang, H Ke, X Zheng, K Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
With the advent of 5G, the industrial Internet of Things has developed rapidly. The industrial
sensor-cloud system (SCS) has also received widespread attention. In the future, a large …

LSH-aware multitype health data prediction with privacy preservation in edge environment

L Kong, L Wang, W Gong, C Yan, Y Duan, L Qi - World Wide Web, 2022 - Springer
With the increasing development of electronic technology, traditional paper-driven medical
systems have been converting to efficient electronic records that can be easily checked and …

MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things

T Wang, H Luo, W Jia, A Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data
collection, processing, analysis, storage, and sharing on demand. However, compromised …

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

S Zhang, X Li, Z Tan, T Peng, G Wang - Future Generation Computer …, 2019 - Elsevier
With the rapid pervasion of location-based services (LBSs), protection of location privacy
has become a significant concern. In most continuous LBSs' privacy-preserving solutions …

ADTT: A highly efficient distributed tensor-train decomposition method for IIoT big data

X Wang, LT Yang, Y Wang, L Ren… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) is growing quickly due to increasing deployment and
integration of smart sensors, instruments, and devices, and software using wired or wireless …

Link prediction in paper citation network to construct paper correlation graph

H Liu, H Kou, C Yan, L Qi - EURASIP Journal on Wireless …, 2019 - Springer
Nowadays, recommender system has become one of the main tools to search for users'
interested papers. Since one paper often contains only a part of keywords that a user is …

Coverless real-time image information hiding based on image block matching and dense convolutional network

Y Luo, J Qin, X **ang, Y Tan, Q Liu, L **ang - Journal of Real-Time Image …, 2020 - Springer
Abstract Information security has become a key issue of public concern recently. In order to
radically resist the decryption and analysis in the field of image information hiding and …