nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Acceleration offloading for differential privacy protection based on federated learning in edge intelligent controllers
|
Shang, Wenli |
|
|
163 |
C |
p. |
artikel |
2 |
A Digital Twin-based multi-objective optimized task offloading and scheduling scheme for vehicular edge networks
|
Zhu, Lin |
|
|
163 |
C |
p. |
artikel |
3 |
A multi-level IIOT platform for boosting mines digitalization
|
Miñón, Raúl |
|
|
163 |
C |
p. |
artikel |
4 |
Analyzing inference workloads for spatiotemporal modeling
|
Jain, Milan |
|
|
163 |
C |
p. |
artikel |
5 |
An efficient federated learning solution for the artificial intelligence of things
|
Kouda, Mohamed Amine |
|
|
163 |
C |
p. |
artikel |
6 |
An intelligent native network slicing security architecture empowered by federated learning
|
Moreira, Rodrigo |
|
|
163 |
C |
p. |
artikel |
7 |
A priority-aware dynamic scheduling algorithm for ensuring data freshness in 5G networks
|
Kim, Beom-Su |
|
|
163 |
C |
p. |
artikel |
8 |
Big Data-driven MLOps workflow for annual high-resolution land cover classification models
|
Burgueño-Romero, Antonio M. |
|
|
163 |
C |
p. |
artikel |
9 |
Blockchain based computing power sharing in urban rail transit: System design and performance improvement
|
Liang, Yanan |
|
|
163 |
C |
p. |
artikel |
10 |
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks
|
Xiong, Ling |
|
|
163 |
C |
p. |
artikel |
11 |
Bodyless block propagation: TPS fully scalable blockchain with pre-validation
|
Zhao, Chonghe |
|
|
163 |
C |
p. |
artikel |
12 |
Bus travel feature inference with small samples based on multi-clustering topic model over Internet of Things
|
Liu, Hongjie |
|
|
163 |
C |
p. |
artikel |
13 |
CG-Kit: Code Generation Toolkit for performant and maintainable variants of source code applied to Flash-X hydrodynamics simulations
|
Rudi, Johann |
|
|
163 |
C |
p. |
artikel |
14 |
Connected vehicles ecological driving based on deep reinforce learning: Application of Web 3.0 technologies in traffic optimization
|
Ma, Minghui |
|
|
163 |
C |
p. |
artikel |
15 |
Correlating node centrality metrics with node resilience in self-healing systems with limited neighbourhood information
|
Rodríguez, Arles |
|
|
163 |
C |
p. |
artikel |
16 |
DDPG-AdaptConfig: A deep reinforcement learning framework for adaptive device selection and training configuration in heterogeneity federated learning
|
Yu, Xinlei |
|
|
163 |
C |
p. |
artikel |
17 |
DetectVul: A statement-level code vulnerability detection for Python
|
Tran, Hoai-Chau |
|
|
163 |
C |
p. |
artikel |
18 |
Editorial Board
|
|
|
|
163 |
C |
p. |
artikel |
19 |
Enhancing interconnection network topology for chiplet-based systems: An automated design framework
|
Cao, Zhipeng |
|
|
163 |
C |
p. |
artikel |
20 |
Expanding SafeSU capabilities by leveraging security frameworks for contention monitoring in complex SoCs
|
Andreu, Pablo |
|
|
163 |
C |
p. |
artikel |
21 |
Feature Bagging with Nested Rotations (FBNR) for anomaly detection in multivariate time series
|
Iliopoulos, Anastasios |
|
|
163 |
C |
p. |
artikel |
22 |
FedDA: Resource-adaptive federated learning with dual-alignment aggregation optimization for heterogeneous edge devices
|
Cao, Shaohua |
|
|
163 |
C |
p. |
artikel |
23 |
Feed4Cloud: Towards trustworthy QoE-aware cloud service monitoring using blockchain
|
Kapetanidou, Ioanna Angeliki |
|
|
163 |
C |
p. |
artikel |
24 |
FeL-MAR: Federated learning based multi resident activity recognition in IoT enabled smart homes
|
Dahal, Abisek |
|
|
163 |
C |
p. |
artikel |
25 |
Generative adversarial networks to detect intrusion and anomaly in IP flow-based networks
|
da Silva Ruffo, Vitor G. |
|
|
163 |
C |
p. |
artikel |
26 |
GenesisRM: A state-driven approach to resource management for distributed JVM web applications
|
Xu, Dishi |
|
|
163 |
C |
p. |
artikel |
27 |
Guest Editorial for the Special Issue on Federated Learning on the Edge: Challenges and Future Directions
|
Piccialli, Francesco |
|
|
163 |
C |
p. |
artikel |
28 |
Improving WSN-based dataset using data augmentation for TSCH protocol performance modeling
|
Alipio, Melchizedek |
|
|
163 |
C |
p. |
artikel |
29 |
Intelligent transportation system for automated medical services during pandemic
|
Singh, Amit Kumar |
|
|
163 |
C |
p. |
artikel |
30 |
Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks
|
Hakiri, Akram |
|
|
163 |
C |
p. |
artikel |
31 |
Latency-aware scheduling for data-oriented service requests in collaborative IoT-edge-cloud networks
|
Sun, Mengyu |
|
|
163 |
C |
p. |
artikel |
32 |
LGTDA: Bandwidth exhaustion attack on Ethereum via dust transactions
|
Sun, Qunhong |
|
|
163 |
C |
p. |
artikel |
33 |
MITgcm-AD v2: Open source tangent linear and adjoint modeling framework for the oceans and atmosphere enabled by the Automatic Differentiation tool Tapenade
|
Gaikwad, Shreyas Sunil |
|
|
163 |
C |
p. |
artikel |
34 |
MobFedLS: A framework to provide federated learning for mobile nodes in V2X environments
|
Barreto, Bernardo |
|
|
163 |
C |
p. |
artikel |
35 |
Multifacets of lossy compression for scientific data in the Joint-Laboratory of Extreme Scale Computing
|
Cappello, Franck |
|
|
163 |
C |
p. |
artikel |
36 |
Olsync: Object-level tiering and coordination in tiered storage systems based on software-defined network
|
Li, Zhike |
|
|
163 |
C |
p. |
artikel |
37 |
Overlapping community detection using graph attention networks
|
Sismanis, Konstantinos |
|
|
163 |
C |
p. |
artikel |
38 |
Popularity-based multiple-replica cloud storage integrity auditing for big data
|
Chen, Guoqing |
|
|
163 |
C |
p. |
artikel |
39 |
PPAT: An effective scheme ensuring privacy-preserving, accuracy, and trust for worker selection in mobile crowdsensing networks
|
Guo, Qianxue |
|
|
163 |
C |
p. |
artikel |
40 |
QM-ARC: QoS-aware Multi-tier Adaptive Cache Replacement Strategy
|
Ait-Oucheggou, Lydia |
|
|
163 |
C |
p. |
artikel |
41 |
READ: Resource efficient authentication scheme for digital twin edge networks
|
Wang, Kai |
|
|
163 |
C |
p. |
artikel |
42 |
Self-aware collaborative edge inference with embedded devices for IIoT
|
Chen, Yifan |
|
|
163 |
C |
p. |
artikel |
43 |
ServlessSimPro: A comprehensive serverless simulation platform
|
Cao, Han |
|
|
163 |
C |
p. |
artikel |
44 |
Software stewardship and advancement of a high-performance computing scientific application: QMCPACK
|
Godoy, William F. |
|
|
163 |
C |
p. |
artikel |
45 |
Special Collection on Advances in Quantum Computing: Methods, Algorithms, and Systems
|
Markidis, Stefano |
|
|
163 |
C |
p. |
artikel |
46 |
Split ways: Using GAN watermarking for digital image protection with privacy-preserving split model training
|
Singh, Himanshu Kumar |
|
|
163 |
C |
p. |
artikel |
47 |
To tune or not to tune? An approach for recommending important hyperparameters for classification and clustering algorithms
|
Shawi, Radwa El |
|
|
163 |
C |
p. |
artikel |
48 |
Towards benchmarking erasure coding schemes in object storage system: A systematic review
|
Noor, Jannatun |
|
|
163 |
C |
p. |
artikel |
49 |
Trajectory privacy preservation model based on LSTM-DCGAN
|
Hu, Jiajia |
|
|
163 |
C |
p. |
artikel |
50 |
Two-stage multi-objective optimization based on knowledge-driven approach: A case study on production and transportation integration
|
Ding, Ziqi |
|
|
163 |
C |
p. |
artikel |
51 |
UAV-IRS-assisted energy harvesting for edge computing based on deep reinforcement learning
|
Pang, Shanchen |
|
|
163 |
C |
p. |
artikel |
52 |
VLR-BPP: An intelligent virtual location replacement based bilateral privacy-preserving architecture for edge cloud systems
|
Yang, Bochang |
|
|
163 |
C |
p. |
artikel |
53 |
ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems
|
Roy, Prasanta Kumar |
|
|
163 |
C |
p. |
artikel |