Search
Now showing items 391-400 of 412
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ...
Combating jamming attacks in multi-channel IoT networks using game theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
Deep CNN-Based real-time traffic light detector for self-driving vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the unavailability of Vehicle-to-Infrastructure (V2I) communication in current transportation systems, Traffic Light Detection (TLD) is still considered an important module in autonomous vehicles and Driver Assistance ...
Internet of things mobility over information-centric/named-data networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Information-centric networking (ICN) is a content-oriented network that uses content instead of traditional IP addresses, it facilitates the content retrieval and calculates downstream paths without the need of an optimal ...
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
An efficient and privacy-preserving energy trading scheme based on blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...