Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 A blockchain-based audit approach for encrypted data in federated learning Sun, Zhe

8 5 p. 614-624
article
2 Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT Wang, Linjie

8 5 p. 644-653
article
3 An ellipse-guided routing algorithm in wireless sensor networks Yang, Jianjun

8 5 p. 770-777
article
4 An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things Miao, Qinyang

8 5 p. 636-643
article
5 A potential game-based outsourcing computation framework for multiple calculators Zhang, Duo

8 5 p. 654-663
article
6 A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing Paranjothi, Anirudh

8 5 p. 814-824
article
7 A survey on blockchain-based integrity auditing for cloud data Han, Haoxiang

8 5 p. 591-603
article
8 A survey on deep learning for textual emotion analysis in social networks Peng, Sancheng

8 5 p. 745-762
article
9 A survey on user-centric cell-free massive MIMO systems Chen, Shuaifei

8 5 p. 695-719
article
10 Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection Huang, Yiting

8 5 p. 604-613
article
11 Blockchain-based fog radio access networks: Architecture, key technologies, and challenges Wang, Zixin

8 5 p. 720-726
article
12 Can blockchain link the future? Qiao, Liang

8 5 p. 687-694
article
13 Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks Bulti, Dinkisa A.

8 5 p. 843-852
article
14 DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network Jiang, Peng

8 5 p. 791-803
article
15 Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks Zhi, Yuan

8 5 p. 834-842
article
16 Detecting conflict of heterogeneous access control policies Yu, Mingjie

8 5 p. 664-679
article
17 Editorial Board
8 5 p. ii-iii
article
18 Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications Yan, Zheng

8 5 p. 589-590
article
19 Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things Salah ud din, Muhammad

8 5 p. 778-790
article
20 Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis Qin, Fangchi

8 5 p. 680-686
article
21 Multi-objective optimization for task offloading based on network calculus in fog environments Ren, Qian

8 5 p. 825-833
article
22 Observer-based event-triggered networked multi-drives speed consensus Masroor, Suhaib

8 5 p. 763-769
article
23 Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology Shen, Yi

8 5 p. 853-863
article
24 Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems Wang, Dan

8 5 p. 625-635
article
25 Survey on recent advances in IoT application layer protocols and machine learning scope for research directions Donta, Praveen Kumar

8 5 p. 727-744
article
26 Using dummy data for RFID tag and reader authentication Alsaify, Baha’ A.

8 5 p. 804-813
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands