Differential privacy techniques for cyber physical systems: A survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …
development of information and communication technologies (ICT). With the provision of …
Swarm intelligence-based algorithms within IoT-based systems: A review
IoT-based systems are complex and dynamic aggregations of entities (Smart Objects) which
usually lack decentralized control. Swarm Intelligence systems are decentralized, self …
usually lack decentralized control. Swarm Intelligence systems are decentralized, self …
A hybrid blockchain-based identity authentication scheme for multi-WSN
Z Cui, XUE Fei, S Zhang, X Cai, Y Cao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) equipment is usually in a harsh environment, and its security has
always been a widely concerned issue. Node identity authentication is an important means …
always been a widely concerned issue. Node identity authentication is an important means …
Personalized recommendation system based on collaborative filtering for IoT scenarios
Z Cui, X Xu, XUE Fei, X Cai, Y Cao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Recommendation technology is an important part of the Internet of Things (IoT) services,
which can provide better service for users and help users get information anytime …
which can provide better service for users and help users get information anytime …
A new subspace clustering strategy for AI-based data analysis in IoT system
Z Cui, X **g, P Zhao, W Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet-of-Things (IoT) technology is widely used in various fields. In the Earth
observation system, hyperspectral images (HSIs) are acquired by hyperspectral sensors and …
observation system, hyperspectral images (HSIs) are acquired by hyperspectral sensors and …
Detection of malicious code variants based on deep learning
Z Cui, F Xue, X Cai, Y Cao, G Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the development of the Internet, malicious code attacks have increased exponentially,
with malicious code variants ranking as a key threat to Internet security. The ability to detect …
with malicious code variants ranking as a key threat to Internet security. The ability to detect …
DEAL: Differentially private auction for blockchain-based microgrids energy trading
Modern smart homes are being equipped with certain renewable energy resources that can
produce their own electric energy. From time to time, these smart homes or microgrids are …
produce their own electric energy. From time to time, these smart homes or microgrids are …
An under‐sampled software defect prediction method based on hybrid multi‐objective cuckoo search
X Cai, Y Niu, S Geng, J Zhang, Z Cui… - Concurrency and …, 2020 - Wiley Online Library
Both the problem of class imbalance in datasets and parameter selection of Support Vector
Machine (SVM) are crucial to predict software defects. However, there is no one working to …
Machine (SVM) are crucial to predict software defects. However, there is no one working to …
An effective improved co-evolution ant colony optimisation algorithm with multi-strategies and its application
W Deng, J Xu, Y Song, H Zhao - International Journal of …, 2020 - inderscienceonline.com
In this paper, an effective improved co-evolution ant colony optimisation (MSICEAO)
algorithm is presented to solve complex optimisation problem. In the MSICEAO, the multi …
algorithm is presented to solve complex optimisation problem. In the MSICEAO, the multi …
An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals
Deep learning, for image data processing, has been widely used to solve a variety of
problems related to medical practices. However, researchers are constantly struggling to …
problems related to medical practices. However, researchers are constantly struggling to …