nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A big data platform exploiting auditable tokenization to promote good practices inside local energy communities
|
Gagliardelli, Luca |
|
|
141 |
C |
p. 595-610 |
artikel |
2 |
A blockchain based access control scheme with hidden policy and attribute
|
Wu, Nannan |
|
|
141 |
C |
p. 186-196 |
artikel |
3 |
A collaborative scheduling method for cloud computing heterogeneous workflows based on deep reinforcement learning
|
Chen, Genxin |
|
|
141 |
C |
p. 284-297 |
artikel |
4 |
A data balancing approach based on generative adversarial network
|
Yuan, Lixiang |
|
|
141 |
C |
p. 768-776 |
artikel |
5 |
A homomorphic approach for security and privacy preservation of Smart Airports
|
Malik, Haroon |
|
|
141 |
C |
p. 500-513 |
artikel |
6 |
AI-based sound source localization system with higher accuracy
|
Yang, Xu |
|
|
141 |
C |
p. 1-15 |
artikel |
7 |
An extended analytical framework for heterogeneous implementations of light cryptographic algorithms
|
Damaj, Issam W. |
|
|
141 |
C |
p. 154-172 |
artikel |
8 |
A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization
|
Chen, Lu |
|
|
141 |
C |
p. 577-594 |
artikel |
9 |
An PPG signal and body channel based encryption method for WBANs
|
Han, Wei |
|
|
141 |
C |
p. 704-712 |
artikel |
10 |
A peer-to-peer file storage and sharing system based on consortium blockchain
|
Peng, Shaoliang |
|
|
141 |
C |
p. 197-204 |
artikel |
11 |
A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things
|
Liu, Jinhui |
|
|
141 |
C |
p. 663-676 |
artikel |
12 |
Application of deep reinforcement learning in attacking and protecting structural features-based malicious PDF detector
|
Jiang, Tian |
|
|
141 |
C |
p. 325-338 |
artikel |
13 |
A reliability and truth-aware based online digital data auction mechanism for cybersecurity in MCS
|
Yu, Jiayi |
|
|
141 |
C |
p. 526-541 |
artikel |
14 |
ARFED: Attack-Resistant Federated averaging based on outlier elimination
|
Isik-Polat, Ece |
|
|
141 |
C |
p. 626-650 |
artikel |
15 |
A robust feature reinforcement framework for heterogeneous graphs neural networks
|
Wang, Zehao |
|
|
141 |
C |
p. 143-153 |
artikel |
16 |
Artificial intelligence-based personalized serious game for enhancing the physical and cognitive abilities of the elderly
|
Eun, Sung-Jong |
|
|
141 |
C |
p. 713-722 |
artikel |
17 |
A scalable and energy efficient GPU thread map for m -simplex domains
|
Navarro, Cristóbal A. |
|
|
141 |
C |
p. 651-662 |
artikel |
18 |
A scalable, secure, and semantically interoperable client for cloud-enabled Demand Response
|
Cimmino, Andrea |
|
|
141 |
C |
p. 54-66 |
artikel |
19 |
BiLSTM deep neural network model for imbalanced medical data of IoT systems
|
Woźniak, Marcin |
|
|
141 |
C |
p. 489-499 |
artikel |
20 |
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things
|
A., Sasikumar |
|
|
141 |
C |
p. 16-27 |
artikel |
21 |
Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks
|
Ma, Zhaowei |
|
|
141 |
C |
p. 555-566 |
artikel |
22 |
BS-Join: A novel and efficient mixed batch-stream join method for spatiotemporal data management in Flink
|
Ji, Hangxu |
|
|
141 |
C |
p. 67-80 |
artikel |
23 |
Characterizing and optimizing Kernel resource isolation for containers
|
Wang, Kun |
|
|
141 |
C |
p. 218-229 |
artikel |
24 |
Cloud–edge collaboration-based bi-level optimal scheduling for intelligent healthcare systems
|
Su, Xin |
|
|
141 |
C |
p. 28-39 |
artikel |
25 |
Combating medical noisy labels by disentangled distribution learning and consistency regularization
|
Zhou, Yi |
|
|
141 |
C |
p. 567-576 |
artikel |
26 |
Compact global association based adaptive routing framework for personnel behavior understanding
|
Shi, Lei |
|
|
141 |
C |
p. 514-525 |
artikel |
27 |
DeGTeC: A deep graph-temporal clustering framework for data-parallel job characterization in data centers
|
Liang, Yi |
|
|
141 |
C |
p. 81-95 |
artikel |
28 |
Designing secure business processes for blockchains with SecBPMN2BC
|
Köpke, Julius |
|
|
141 |
C |
p. 382-398 |
artikel |
29 |
Editorial Board
|
|
|
|
141 |
C |
p. ii |
artikel |
30 |
End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum
|
Tusa, Francesco |
|
|
141 |
C |
p. 473-488 |
artikel |
31 |
Explainable indoor localization of BLE devices through RSSI using recursive continuous wavelet transformation and XGBoost classifier
|
Kamal, A.H.M. |
|
|
141 |
C |
p. 230-242 |
artikel |
32 |
FedDOVe: A Federated Deep Q-learning-based Offloading for Vehicular fog computing
|
Sethi, Vivek |
|
|
141 |
C |
p. 96-105 |
artikel |
33 |
From classical to soft computing based watermarking techniques: A comprehensive review
|
Singh, Roop |
|
|
141 |
C |
p. 738-754 |
artikel |
34 |
GP-NFSP: Decentralized task offloading for mobile edge computing with independent reinforcement learning
|
Hou, Jiaxin |
|
|
141 |
C |
p. 205-217 |
artikel |
35 |
Improving Density Peaks Clustering through GPU acceleration
|
Liu, Zhuojin |
|
|
141 |
C |
p. 399-413 |
artikel |
36 |
Infrastructure-level Support for GPU-Enabled Deep Learning in DATAVIEW
|
Liu, Junwen |
|
|
141 |
C |
p. 723-737 |
artikel |
37 |
LGAN-DP: A novel differential private publication mechanism of trajectory data
|
Zhang, Ziming |
|
|
141 |
C |
p. 692-703 |
artikel |
38 |
Multi-Access Edge Computing assisted ultra-low energy scheduling and harvesting in multi-hop Wireless Sensor and Actuator Network for energy neutral self-sustainable Next-gen Cyber-Physical System
|
Mishra, Ayaskanta |
|
|
141 |
C |
p. 298-324 |
artikel |
39 |
Multi-agent deep reinforcement learning for online request scheduling in edge cooperation networks
|
Zhang, Yaqiang |
|
|
141 |
C |
p. 258-268 |
artikel |
40 |
Multi-search-routes-based methods for minimizing makespan of homogeneous and heterogeneous resources in Cloud computing
|
Zhou, Guangyao |
|
|
141 |
C |
p. 414-432 |
artikel |
41 |
Online optimization of intelligent reflecting surface-aided energy-efficient IoT-edge computing
|
Wang, Zhongyang |
|
|
141 |
C |
p. 611-625 |
artikel |
42 |
On the application of active learning for efficient and effective IoT botnet detection
|
Guerra-Manzanares, Alejandro |
|
|
141 |
C |
p. 40-53 |
artikel |
43 |
Ontology-based approach to real-time risk management and cyber-situational awareness
|
Sánchez-Zas, Carmen |
|
|
141 |
C |
p. 462-472 |
artikel |
44 |
Optimized power control strategy in Massive MIMO for distributed IoT networks
|
Lee, Byung Moo |
|
|
141 |
C |
p. 433-447 |
artikel |
45 |
Practical fully leakage resilient signatures with auxiliary inputs
|
Cai, Cailing |
|
|
141 |
C |
p. 448-461 |
artikel |
46 |
PS-CRDTs: CRDTs in highly volatile environments
|
Barreto, António |
|
|
141 |
C |
p. 755-767 |
artikel |
47 |
PSDCE: Physiological signal-based double chaotic encryption for instantaneous E-healthcare services
|
Wang, Junchao |
|
|
141 |
C |
p. 116-128 |
artikel |
48 |
Reinforcement learning-based cost-efficient service function chaining with CoMP zero-forcing beamforming in edge networks
|
Wang, Kan |
|
|
141 |
C |
p. 355-368 |
artikel |
49 |
RUAD: Unsupervised anomaly detection in HPC systems
|
Molan, Martin |
|
|
141 |
C |
p. 542-554 |
artikel |
50 |
Secure HPC: A workflow providing a secure partition on an HPC system
|
Nolte, Hendrik |
|
|
141 |
C |
p. 677-691 |
artikel |
51 |
SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL
|
Romero, Jose Carlos |
|
|
141 |
C |
p. 269-283 |
artikel |
52 |
SPsync: Lightweight multi-terminal big spatiotemporal data synchronization solution
|
Zhang, Weisheng |
|
|
141 |
C |
p. 106-115 |
artikel |
53 |
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G
|
Abdulqadder, Ihsan H. |
|
|
141 |
C |
p. 339-354 |
artikel |
54 |
The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures
|
Volpert, Simon |
|
|
141 |
C |
p. 243-257 |
artikel |
55 |
Towards cost-effective and robust AI microservice deployment in edge computing environments
|
Wu, Chunrong |
|
|
141 |
C |
p. 129-142 |
artikel |
56 |
User-centric base station clustering and resource allocation for cell-edge users in 6G ultra-dense networks
|
Su, Yuhan |
|
|
141 |
C |
p. 173-185 |
artikel |
57 |
Workload categorization for hazardous industries: The semantic modelling of multi-modal physiological data
|
König, Jemma L. |
|
|
141 |
C |
p. 369-381 |
artikel |