A comprehensive survey on privacy-preserving techniques in federated recommendation systems

M Asad, S Shaukat, E Javanmardi, J Nakazato… - Applied Sciences, 2023 - mdpi.com
Big data is a rapidly growing field, and new developments are constantly emerging to
address various challenges. One such development is the use of federated learning for …

Access control in Internet of Things: A survey

R Trabelsi, G Fersi, M Jmaiel - Computers & Security, 2023 - Elsevier
The speedy boom of Internet of Things (IoT) devices has revolutionized many fields
including smart cities, healthcare, smart homes, etc. Most of these devices exchange …

Virtual-reality interpromotion technology for metaverse: A survey

D Wu, Z Yang, P Zhang, R Wang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The metaverse aims to build an immersive virtual reality world to support the daily life, work,
and recreation of people. In this survey, the status quo of the metaverse is investigated, and …

Deep learning-based solution for smart contract vulnerabilities detection

X Tang, Y Du, A Lai, Z Zhang, L Shi - Scientific Reports, 2023 - nature.com
This paper aims to explore the application of deep learning in smart contract vulnerabilities
detection. Smart contracts are an essential part of blockchain technology and are crucial for …

Effective combining source code and opcode for accurate vulnerability detection of smart contracts in edge AI systems

H Huang, L Guo, L Zhao, H Wang, C Xu, S Jiang - Applied Soft Computing, 2024 - Elsevier
Automating transactions using smart contracts extends the functionality of blockchains and
secures the decentralization of blockchains in edge AI systems. Whereas, since plenty of …

[HTML][HTML] Smart contract-based access control framework for internet of things devices

MR Hasan, A Alazab, SB Joy, MN Uddin, MA Uddin… - Computers, 2023 - mdpi.com
The Internet of Things (IoT) has recently attracted much interest from researchers due to its
diverse IoT applications. However, IoT systems encounter additional security and privacy …

[HTML][HTML] Internet of things for smart manufacturing based on advanced encryption standard (AES) algorithm with chaotic system

X Huo, X Wang - Results in Engineering, 2023 - Elsevier
Smart manufacturing using the Internet of Things (IoT) ensures uninterrupted and human
intervention-less automation in industries for precision outcomes. As the smart …

Evolutionary analysis of the regulation of data abuse in digital platforms

Z Wang, C Yuan, X Li - Systems, 2023 - mdpi.com
This study proposes a tripartite evolutionary game model to investigate the interactions
among digital platforms, governments, and users to address the negative consequences of …

Fine-grained access control policy in blockchain-enabled edge computing

G He, C Li, Y Shu, Y Luo - Journal of Network and Computer Applications, 2024 - Elsevier
In the process of data sharing and interaction between untrusted intelligence edge devices,
there are risks of misuse and tampering with the data. Hence, how to ensure data security …

Unknown threats detection methods of smart contracts

D He, K Ding, S Chan, M Guizani - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the explosive growth of blockchain platforms and applications, security threats of
blockchain also occur frequently. As a decentralized application deployed on the …