Search
Now showing items 31-40 of 40
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ...
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ...
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
An efficient and privacy-preserving energy trading scheme based on blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach
(
Elsevier B.V.
, 2019 , Article)
Nowadays, with the rapid development and wide application of Internet of Things technology, Industrial Internet of Things (IIoT) has become an essential part of industrial systems. A large number of IoT devices has enabled ...