no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A blockchain-based signature exchange protocol for metaverse
|
Chen, Jiahui |
|
|
142 |
C |
p. 237-247 |
article |
2 |
A comparative study of adversarial training methods for neural models of source code
|
Li, Zhen |
|
|
142 |
C |
p. 165-181 |
article |
3 |
Adaptive elasticity policies for staging-based in situ visualization
|
Wang, Zhe |
|
|
142 |
C |
p. 75-89 |
article |
4 |
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control
|
Li, Jiatao |
|
|
142 |
C |
p. 195-211 |
article |
5 |
A secured big-data sharing platform for materials genome engineering: State-of-the-art, challenges and architecture
|
Wang, Ran |
|
|
142 |
C |
p. 59-74 |
article |
6 |
BSKM-FC: Blockchain-based secured key management in a fog computing environment
|
Gowda, Naveen Chandra |
|
|
142 |
C |
p. 276-291 |
article |
7 |
DP-TrajGAN: A privacy-aware trajectory generation model with differential privacy
|
Zhang, Jing |
|
|
142 |
C |
p. 25-40 |
article |
8 |
Dual-attention assisted deep reinforcement learning algorithm for energy-efficient resource allocation in Industrial Internet of Things
|
Wang, Ying |
|
|
142 |
C |
p. 150-164 |
article |
9 |
Editorial Board
|
|
|
|
142 |
C |
p. ii |
article |
10 |
Fusion of blockchain and IoT in scientific publishing: Taxonomy, tools, and future directions
|
Tanwar, Sudeep |
|
|
142 |
C |
p. 248-275 |
article |
11 |
Globus automation services: Research process automation across the space–time continuum
|
Chard, Ryan |
|
|
142 |
C |
p. 393-409 |
article |
12 |
HAMLET: A framework for Human-centered AutoML via Structured Argumentation
|
Francia, Matteo |
|
|
142 |
C |
p. 182-194 |
article |
13 |
Hasse sensitivity level: A sensitivity-aware trajectory privacy-enhanced framework with Reinforcement Learning
|
Zhang, Jing |
|
|
142 |
C |
p. 301-313 |
article |
14 |
HCL-Classifier: CNN and LSTM based hybrid malware classifier for Internet of Things (IoT)
|
Abdullah, Muhammed Amin |
|
|
142 |
C |
p. 41-58 |
article |
15 |
Human activity recognition using marine predators algorithm with deep learning
|
Helmi, Ahmed M. |
|
|
142 |
C |
p. 340-350 |
article |
16 |
Intent-based network slicing for SDN vertical services with assurance: Context, design and preliminary experiments
|
Martini, B. |
|
|
142 |
C |
p. 101-116 |
article |
17 |
Latency-constrained DNN architecture learning for edge systems using zerorized batch normalization
|
Huai, Shuo |
|
|
142 |
C |
p. 314-327 |
article |
18 |
Less is not more: We need rich datasets to explore
|
Versluis, Laurens |
|
|
142 |
C |
p. 117-130 |
article |
19 |
MAG-D: A multivariate attention network based approach for cloud workload forecasting
|
Patel, Yashwant Singh |
|
|
142 |
C |
p. 376-392 |
article |
20 |
Multi-scale image–text matching network for scene and spatio-temporal images
|
Yu, Runde |
|
|
142 |
C |
p. 292-300 |
article |
21 |
New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy
|
Zhang, De-Gan |
|
|
142 |
C |
p. 131-149 |
article |
22 |
Nextflow in Bioinformatics: Executors Performance Comparison Using Genomics Data
|
Spišaková, Viktória |
|
|
142 |
C |
p. 328-339 |
article |
23 |
PP–GSM: Privacy-preserving graphical security model for security assessment as a service
|
Lee, Dongwon |
|
|
142 |
C |
p. 351-363 |
article |
24 |
Progressive unsupervised video person re-identification with accumulative motion and tracklet spatial–temporal correlation
|
Yang, Yuanfeng |
|
|
142 |
C |
p. 90-100 |
article |
25 |
SecurePrivChain: A decentralized framework for securing the global model using cryptography
|
Sanam, Kahkishan |
|
|
142 |
C |
p. 364-375 |
article |
26 |
Self-adaptive reconstruction for compressed sensing based ECG acquisition in wireless body area network
|
Zhang, Li-bo |
|
|
142 |
C |
p. 228-236 |
article |
27 |
Semantic modeling and design patterns for IoT ecosystems
|
Potena, Domenico |
|
|
142 |
C |
p. 1-3 |
article |
28 |
The stream data warehouse: Page replacement algorithms and quality of service metrics
|
Gorawski, M. |
|
|
142 |
C |
p. 212-227 |
article |
29 |
Towards containerized, reuse-oriented AI deployment platforms for cognitive IoT applications
|
Veiga, Tiago |
|
|
142 |
C |
p. 4-13 |
article |
30 |
Using remote GPU virtualization techniques to enhance edge computing devices
|
Cecilia, José M. |
|
|
142 |
C |
p. 14-24 |
article |