Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance Guo, Lingling

8 4 p. 576-587
article
2 A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications Almagrabi, Alaa Omran

8 4 p. 436-445
article
3 Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN Yan, Ke

8 4 p. 531-539
article
4 Dynamic defenses in cyber security: Techniques, methods and challenges Zheng, Yu

8 4 p. 422-435
article
5 Editorial Board
8 4 p. ii-iii
article
6 Efficient pipelined flow classification for intelligent data processing in IoT Mousavi, Seyed Navid

8 4 p. 561-575
article
7 Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths Li, Jialin

8 4 p. 455-465
article
8 Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse Yang, Yihong

8 4 p. 498-507
article
9 FedCDR: Privacy-preserving federated cross-domain recommendation Yan, Dengcheng

8 4 p. 552-560
article
10 Guest editorial: Special issue on security and privacy for AI-powered smart IoT applications
8 4 p. 411-414
article
11 Intrusion detection and prevention system for an IoT environment Kumar, Ajay

8 4 p. 540-551
article
12 Kernel-based adversarial attacks and defenses on support vector classification Li, Wanman

8 4 p. 492-497
article
13 Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks Deng, Dan

8 4 p. 415-421
article
14 Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing Zhang, Qi

8 4 p. 516-530
article
15 N-gram MalGAN: Evading machine learning detection via feature n-gram Zhu, Enmin

8 4 p. 485-491
article
16 Research advances on blockchain-as-a-service: architectures, applications and challenges Song, Jie

8 4 p. 466-475
article
17 Safeguarding cross-silo federated learning with local differential privacy Wang, Chen

8 4 p. 446-454
article
18 Splitting and placement of data-intensive applications with machine learning for power system in cloud computing Xu, Zhanyang

8 4 p. 476-484
article
19 Sports match prediction model for training and exercise using attention-based LSTM network Zhang, Qiyun

8 4 p. 508-515
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands