no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance
|
Guo, Lingling |
|
|
8 |
4 |
p. 576-587 |
article |
2 |
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications
|
Almagrabi, Alaa Omran |
|
|
8 |
4 |
p. 436-445 |
article |
3 |
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN
|
Yan, Ke |
|
|
8 |
4 |
p. 531-539 |
article |
4 |
Dynamic defenses in cyber security: Techniques, methods and challenges
|
Zheng, Yu |
|
|
8 |
4 |
p. 422-435 |
article |
5 |
Editorial Board
|
|
|
|
8 |
4 |
p. ii-iii |
article |
6 |
Efficient pipelined flow classification for intelligent data processing in IoT
|
Mousavi, Seyed Navid |
|
|
8 |
4 |
p. 561-575 |
article |
7 |
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
|
Li, Jialin |
|
|
8 |
4 |
p. 455-465 |
article |
8 |
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse
|
Yang, Yihong |
|
|
8 |
4 |
p. 498-507 |
article |
9 |
FedCDR: Privacy-preserving federated cross-domain recommendation
|
Yan, Dengcheng |
|
|
8 |
4 |
p. 552-560 |
article |
10 |
Guest editorial: Special issue on security and privacy for AI-powered smart IoT applications
|
|
|
|
8 |
4 |
p. 411-414 |
article |
11 |
Intrusion detection and prevention system for an IoT environment
|
Kumar, Ajay |
|
|
8 |
4 |
p. 540-551 |
article |
12 |
Kernel-based adversarial attacks and defenses on support vector classification
|
Li, Wanman |
|
|
8 |
4 |
p. 492-497 |
article |
13 |
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks
|
Deng, Dan |
|
|
8 |
4 |
p. 415-421 |
article |
14 |
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing
|
Zhang, Qi |
|
|
8 |
4 |
p. 516-530 |
article |
15 |
N-gram MalGAN: Evading machine learning detection via feature n-gram
|
Zhu, Enmin |
|
|
8 |
4 |
p. 485-491 |
article |
16 |
Research advances on blockchain-as-a-service: architectures, applications and challenges
|
Song, Jie |
|
|
8 |
4 |
p. 466-475 |
article |
17 |
Safeguarding cross-silo federated learning with local differential privacy
|
Wang, Chen |
|
|
8 |
4 |
p. 446-454 |
article |
18 |
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing
|
Xu, Zhanyang |
|
|
8 |
4 |
p. 476-484 |
article |
19 |
Sports match prediction model for training and exercise using attention-based LSTM network
|
Zhang, Qiyun |
|
|
8 |
4 |
p. 508-515 |
article |