nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems
|
Stabili, Dario |
|
|
144 |
C |
p. 151-164 |
artikel |
2 |
Analysis of security and data control in smart personal assistants from the user’s perspective
|
Valero, Cayetano |
|
|
144 |
C |
p. 12-23 |
artikel |
3 |
A package-aware scheduling strategy for edge serverless functions based on multi-stage optimization
|
Zheng, Senjiong |
|
|
144 |
C |
p. 105-116 |
artikel |
4 |
A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare
|
Zhou, Yousheng |
|
|
144 |
C |
p. 63-73 |
artikel |
5 |
A scalable simulator for cloud, fog and edge computing platforms with mobility support
|
Del-Pozo-Puñal, Elías |
|
|
144 |
C |
p. 117-130 |
artikel |
6 |
BEAST: Behavior as a Service for Trust management in IoT devices
|
Huber, Brennan |
|
|
144 |
C |
p. 165-178 |
artikel |
7 |
Big data-assisted urban governance: An intelligent real-time monitoring and early warning system for public opinion in government hotline
|
Zhang, Zicheng |
|
|
144 |
C |
p. 90-104 |
artikel |
8 |
Crowdsourcing landmark-assisted localization with deep learning
|
Junoh, Suhardi Azliy |
|
|
144 |
C |
p. 256-270 |
artikel |
9 |
Cybersecurity in the digital world
|
González-Manzano, Lorena |
|
|
144 |
C |
p. 242-243 |
artikel |
10 |
Deep learning for understanding multilabel imbalanced Chest X-ray datasets
|
Liz, Helena |
|
|
144 |
C |
p. 291-306 |
artikel |
11 |
Deep reinforcement learning based scheduling strategy for federated learning in sensor-cloud systems
|
Zhang, Tinghao |
|
|
144 |
C |
p. 219-229 |
artikel |
12 |
Deep unified attention-based sequence modeling for online anomalous trajectory detection
|
Wang, Chenhao |
|
|
144 |
C |
p. 1-11 |
artikel |
13 |
Editorial Board
|
|
|
|
144 |
C |
p. ii |
artikel |
14 |
FedDCS: A distributed client selection framework for cross device federated learning
|
Panigrahi, Monalisa |
|
|
144 |
C |
p. 24-36 |
artikel |
15 |
Generating valid test data through data cloning
|
Oriol, Xavier |
|
|
144 |
C |
p. 179-191 |
artikel |
16 |
Integration of blockchain and edge computing in internet of things: A survey
|
Xue, He |
|
|
144 |
C |
p. 307-326 |
artikel |
17 |
Intelligent queue management of open vSwitch in multi-tenant data center
|
Ma, Huihui |
|
|
144 |
C |
p. 50-62 |
artikel |
18 |
MobiPCR: Efficient, accurate, and strict ML-based mobile malware detection
|
Liu, Chuanchang |
|
|
144 |
C |
p. 140-150 |
artikel |
19 |
Multivariate time series anomaly detection with adversarial transformer architecture in the Internet of Things
|
Zeng, Fanyu |
|
|
144 |
C |
p. 244-255 |
artikel |
20 |
Relaxed group pattern detection over massive-scale trajectories
|
Li, Ke |
|
|
144 |
C |
p. 131-139 |
artikel |
21 |
Review on security of federated learning and its application in healthcare
|
Li, Hao |
|
|
144 |
C |
p. 271-290 |
artikel |
22 |
Sparse random neural networks for online anomaly detection on sensor nodes
|
Leroux, Sam |
|
|
144 |
C |
p. 327-343 |
artikel |
23 |
SSAR-GNN: Self-Supervised Artist Recommendation from spatio-temporal perspectives in art history with Graph Neural Networks
|
Zhang, Qinglin |
|
|
144 |
C |
p. 230-241 |
artikel |
24 |
STF-Net: An improved depth network based on spatio-temporal data fusion for PM2.5 concentration prediction
|
Zhang, Xiaoxia |
|
|
144 |
C |
p. 37-49 |
artikel |
25 |
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation
|
Duan, Guoyun |
|
|
144 |
C |
p. 192-204 |
artikel |
26 |
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
|
Caballero, Juan |
|
|
144 |
C |
p. 74-89 |
artikel |
27 |
Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing
|
Li, Dongfen |
|
|
144 |
C |
p. 205-218 |
artikel |