التسجيلات التي قمت بإرسالها

  • Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

    Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
  • Watermarking: A review of software and hardware techniques 

    Sleit, Azzam; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
    Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
  • A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management 

    Sabir, Abdulbadi; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
  • Threat-specific security risk evaluation in the cloud 

    Nhlabatsi, Armstrong; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; Hussein, Alaa; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
  • Quantifying Satisfaction of Security Requirements of Cloud Software Systems 

    Nhlabatsi, Armstrong; Khan, Khaled MD; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
    The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
  • DQN based Blockchain Data Storage in Resource-constrained IoT System 

    Lei, Boyi; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)
    Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
  • Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter 

    Li, Mengyao; Zhu, Rongbo; Ding, Qianao; Wang, Jun; Wan, Shaohua; ... more authors ( Springer , 2023 , Article)
    Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ...
  • Enhanced Beidou user equipment access authentication protocol based on location key 

    Cao, Jin; Bu, Qiuyu; Yang, Yuanyuan; Li, Hui; Liu, Qiao; ... more authors ( Editorial Board of Journal on Communications , 2022 , Article)
    In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ...
  • Active Computing Toward 5G Internet of Things 

    Liu, Chunpeng; Meng, Wei Xiao; Li, Cheng; Ma, Maode ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
    The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
  • Edge intelligence-enabled cyber-physical systems 

    Zhu, Rongbo; Anjum, Ashiq; Li, Hongxiang; Ma, Maode ( John Wiley and Sons Ltd , 2023 , Other)
    With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ...
  • Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios 

    Yan, Lei; Ma, ode; Li, Dandan; Huang, Xiaohong; Ma, Yan; ... more authors ( Tech Science Press , 2023 , Article)
    The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ...
  • Secure Vehicular Platoon Management against Sybil Attacks 

    Junaidi, Danial Ritzuan; Ma, Maode; Su, Rong ( MDPI , 2022 , Article)
    The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ...
  • Preface 

    Ma, Maode ( Institute of Physics , 2022 , Other)
    2022 2nd International Conference on Electron Devices and Applications was held virtually during May 13-15, 2022 via Zoom platform due to the pandemic of COVID-19. With a satisfactory ending of ICEDA 2021, ICEDA 2022 has ...
  • Minimizing energy consumption of IoT devices for O-RAN based IoT systems 

    Wang, Liping; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Elsevier , 2023 , Article)
    The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ...
  • Automatic variable reduction 

    Song, Aijuan; Wu, Guohua; Suganthan, P. N.; Pedrycz, Witold ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
    A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ...
  • An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization 

    Abdel-Nabi, Heba; Ali, Mostafa; Daoud, Mohammad; Alazrai, Rami; Awajan, Arafat; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
    Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ...
  • Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification 

    Hu, Minghui; Gao, Ruobin; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
    Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ...
  • Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study 

    Li, Ruilin; Cui, Jian; Gao, Ruobin; Suganthan, P. N.; Sourina, Olga; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
    Since situation awareness (SA) plays an important role in many fields, the measure of SA is one of the most concerning problems. Using physiological signals to evaluate SA is becoming a popular research topic because of ...
  • Interpretability and accessibility of machine learning in selected food processing, agriculture and health applications 

    Ranasinghe, N.; Ramanan, A.; Fernando, S.; Hameed, P. N.; Herath, D.; ... more authors ( National Science Foundation , 2022 , Other)
    Artificial Intelligence (Al) and its data-centric branch of machine learning (ML) have greatly evolved over the last few decades. However, as Al is used increasingly in real world use cases, the importance of the ...
  • A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques 

    Wu, Guohua; Wen, Xupeng; Wang, Ling; Pedrycz, Witold; Suganthan, Ponnuthurai Nagaratnam ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
    Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ...

عرض المزيد