no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A blockchain-based application for genomic access and variant discovery using smart contracts and homomorphic encryption
|
Mohammed Yakubu, Abukari |
|
|
137 |
C |
p. 234-247 |
article |
2 |
Accelerating kNN search in high dimensional datasets on FPGA by reducing external memory access
|
Song, Xiaojia |
|
|
137 |
C |
p. 189-200 |
article |
3 |
A fingerprint-based localization algorithm based on LSTM and data expansion method for sparse samples
|
Jia, Bing |
|
|
137 |
C |
p. 380-393 |
article |
4 |
A fuzzy logic technique for virtual sensor networks
|
Caroprese, Luciano |
|
|
137 |
C |
p. 302-322 |
article |
5 |
A location-based privacy-preserving oblivious sharing scheme for indoor navigation
|
Yang, Huijie |
|
|
137 |
C |
p. 42-52 |
article |
6 |
A multi-class workflow ensemble management system using on-demand and spot instances in cloud
|
Zolfaghari, Behrooz |
|
|
137 |
C |
p. 97-110 |
article |
7 |
An edge–cloud integrated framework for flexible and dynamic stream analytics
|
Wang, Xin |
|
|
137 |
C |
p. 323-335 |
article |
8 |
An intelligent collaboration framework of IoT applications based on event logic graph
|
Zhu, Min |
|
|
137 |
C |
p. 31-41 |
article |
9 |
An online auction-based incentive mechanism for soft-deadline tasks in Collaborative Edge Computing
|
He, Xingqiu |
|
|
137 |
C |
p. 1-13 |
article |
10 |
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things
|
Awan, Kamran Ahmad |
|
|
137 |
C |
p. 288-301 |
article |
11 |
BTG: A Bridge to Graph machine learning in telecommunications fraud detection
|
Hu, Xinxin |
|
|
137 |
C |
p. 274-287 |
article |
12 |
Cloud-BlackBox: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection
|
Choi, Sang-Hoon |
|
|
137 |
C |
p. 219-233 |
article |
13 |
Deep neural network based UAV deployment and dynamic power control for 6G-Envisioned intelligent warehouse logistics system
|
Zhai, Daosen |
|
|
137 |
C |
p. 164-172 |
article |
14 |
Deep reinforcement learning for energy and time optimized scheduling of precedence-constrained tasks in edge–cloud computing environments
|
Jayanetti, Amanda |
|
|
137 |
C |
p. 14-30 |
article |
15 |
Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network
|
Sellami, Bassem |
|
|
137 |
C |
p. 363-379 |
article |
16 |
Deep understanding of big geospatial data for self-driving: Data, technologies, and systems
|
Wang, Haiyan |
|
|
137 |
C |
p. 146-163 |
article |
17 |
3D genome assisted protein–protein interaction prediction
|
Guo, Zehua |
|
|
137 |
C |
p. 87-96 |
article |
18 |
DQN based user association control in hierarchical mobile edge computing systems for mobile IoT services
|
Lee, Yunseong |
|
|
137 |
C |
p. 53-69 |
article |
19 |
Editorial Board
|
|
|
|
137 |
C |
p. ii |
article |
20 |
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning
|
Duan, Shaoming |
|
|
137 |
C |
p. 336-348 |
article |
21 |
High-efficient hierarchical federated learning on non-IID data with progressive collaboration
|
Cai, Yunyun |
|
|
137 |
C |
p. 111-128 |
article |
22 |
Modeling feature interactions for context-aware QoS prediction of IoT services
|
Chen, Yuanyi |
|
|
137 |
C |
p. 173-185 |
article |
23 |
Path selection for link failure protection in hybrid SDNs
|
Li, Jiahui |
|
|
137 |
C |
p. 201-215 |
article |
24 |
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis
|
Kong, Ke |
|
|
137 |
C |
p. 349-362 |
article |
25 |
PROMENADE: A big data platform for handling city complex networks with dynamic graphs
|
Colarusso, Carmine |
|
|
137 |
C |
p. 129-145 |
article |
26 |
Real-time power optimization for application server clusters based on Mixed-Integer Programming
|
Xiong, Zhi |
|
|
137 |
C |
p. 260-273 |
article |
27 |
Region aware dynamic task scheduling and resource virtualization for load balancing in IoT–fog multi-cloud environment
|
Kanbar, Asan Baker |
|
|
137 |
C |
p. 70-86 |
article |
28 |
Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part I: Artificial Intelligence Applications in Various Fields
|
Wei, Wei |
|
|
137 |
C |
p. 216-218 |
article |
29 |
Special Issue on Artificial Intelligence-of-Things (AIoT): Opportunities, Challenges, and Solutions-Part II: Artificial-Intelligence-Powered Internet of Things
|
Wei, Wei |
|
|
137 |
C |
p. 186-188 |
article |
30 |
Stealthy attack detection method based on Multi-feature long short-term memory prediction model
|
Wang, Jiexi |
|
|
137 |
C |
p. 248-259 |
article |