nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advances in privacy-preserving computing
|
Xue, Kaiping |
|
|
14 |
3 |
p. 1348-1352 |
artikel |
2 |
AENEA: A novel autoencoder-based network embedding algorithm
|
Xu, Xiaolong |
|
|
14 |
3 |
p. 1829-1840 |
artikel |
3 |
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications
|
Ibrahim, Marwa |
|
|
14 |
3 |
p. 1154-1173 |
artikel |
4 |
A location privacy protection scheme for convoy driving in autonomous driving era
|
Ye, Xin |
|
|
14 |
3 |
p. 1388-1400 |
artikel |
5 |
A machine learning based approach for user privacy preservation in social networks
|
Zhang, Yuanming |
|
|
14 |
3 |
p. 1596-1607 |
artikel |
6 |
A mathematical model to describe resource discovery failure in distributed exascale computing systems
|
Adibi, Elham |
|
|
14 |
3 |
p. 1021-1043 |
artikel |
7 |
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs
|
Zhao, Nan |
|
|
14 |
3 |
p. 1058-1070 |
artikel |
8 |
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
|
Onesimu, J. Andrew |
|
|
14 |
3 |
p. 1629-1649 |
artikel |
9 |
An efficient latency aware resource provisioning in cloud assisted mobile edge framework
|
Mulinti, Rajasekhar Bandapalle |
|
|
14 |
3 |
p. 1044-1057 |
artikel |
10 |
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs
|
Moussa, Noureddine |
|
|
14 |
3 |
p. 1334-1347 |
artikel |
11 |
An improved steganography without embedding based on attention GAN
|
Yu, Cong |
|
|
14 |
3 |
p. 1446-1457 |
artikel |
12 |
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data
|
Virupaksha, Shashidhar |
|
|
14 |
3 |
p. 1608-1628 |
artikel |
13 |
A novel spread estimation based abnormal flow detection in high-speed networks
|
Bu, Xiaofei |
|
|
14 |
3 |
p. 1401-1413 |
artikel |
14 |
A novel trust management method to preserve privacy in vehicular ad-hoc networks
|
Behzad, Davood |
|
|
14 |
3 |
p. 1118-1131 |
artikel |
15 |
A provably secure RFID authentication protocol based on ECQV for the medical internet of things
|
Agrahari, Abhay Kumar |
|
|
14 |
3 |
p. 1277-1289 |
artikel |
16 |
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks
|
Zhu, Zihao |
|
|
14 |
3 |
p. 1531-1547 |
artikel |
17 |
A robust and secure multi-authority access control system for cloud storage
|
Gu, Jin |
|
|
14 |
3 |
p. 1488-1499 |
artikel |
18 |
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
|
Rangwani, Diksha |
|
|
14 |
3 |
p. 1548-1571 |
artikel |
19 |
A secure peer to peer multiparty transaction scheme based on blockchain
|
Hong, Hanshu |
|
|
14 |
3 |
p. 1106-1117 |
artikel |
20 |
ASFGNN: Automated separated-federated graph neural network
|
Zheng, Longfei |
|
|
14 |
3 |
p. 1692-1704 |
artikel |
21 |
A uniformization-based approach to preserve individuals’ privacy during process mining analyses
|
Batista, Edgar |
|
|
14 |
3 |
p. 1500-1519 |
artikel |
22 |
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems
|
Xue, Mingfu |
|
|
14 |
3 |
p. 1458-1474 |
artikel |
23 |
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
|
Vivekanandan, Manojkumar |
|
|
14 |
3 |
p. 1572-1595 |
artikel |
24 |
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network
|
Kurri, Varun |
|
|
14 |
3 |
p. 1088-1105 |
artikel |
25 |
Computing tasks assignment optimization among edge computing servers via SDN
|
Bu, Chao |
|
|
14 |
3 |
p. 1190-1206 |
artikel |
26 |
Copyright protection method of big data based on nash equilibrium and constraint optimization
|
Xu, Yabin |
|
|
14 |
3 |
p. 1520-1530 |
artikel |
27 |
Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks
|
Chawra, Vrajesh Kumar |
|
|
14 |
3 |
p. 1316 |
artikel |
28 |
Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks
|
Khadir, Alla Abbas |
|
|
14 |
3 |
p. 1276 |
artikel |
29 |
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach
|
Zhang, Yipin |
|
|
14 |
3 |
p. 1207-1217 |
artikel |
30 |
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage
|
Varri, Uma Sankararao |
|
|
14 |
3 |
p. 1290-1302 |
artikel |
31 |
Efficient privacy-preserving authentication for V2G networks
|
Zhang, Yinghui |
|
|
14 |
3 |
p. 1366-1378 |
artikel |
32 |
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems
|
Tran, Bang |
|
|
14 |
3 |
p. 1475-1487 |
artikel |
33 |
Group task allocation approach for heterogeneous software crowdsourcing tasks
|
Yin, Xiaojing |
|
|
14 |
3 |
p. 1736-1747 |
artikel |
34 |
Guest editorial special issue on “P2P computing for deep learning”
|
Li, Ying |
|
|
14 |
3 |
p. 1734-1735 |
artikel |
35 |
High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism
|
C, Gopala Krishnan |
|
|
14 |
3 |
p. 1229-1241 |
artikel |
36 |
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning
|
Xu, Yi |
|
|
14 |
3 |
p. 1414-1430 |
artikel |
37 |
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks
|
Chawra, Vrajesh Kumar |
|
|
14 |
3 |
p. 1303-1315 |
artikel |
38 |
Impact of data correlation on privacy budget allocation in continuous publication of location statistics
|
Hemkumar, D. |
|
|
14 |
3 |
p. 1650-1665 |
artikel |
39 |
Improved differentiable neural architecture search for single image super-resolution
|
Weng, Yu |
|
|
14 |
3 |
p. 1806-1815 |
artikel |
40 |
Influencing factors analysis in pear disease recognition using deep learning
|
Yang, Fang |
|
|
14 |
3 |
p. 1816-1828 |
artikel |
41 |
Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs
|
Chen, Jian |
|
|
14 |
3 |
p. 1317-1333 |
artikel |
42 |
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges
|
Khatri, Sahil |
|
|
14 |
3 |
p. 1778-1805 |
artikel |
43 |
Modeling & analysis of software defined networks under non-stationary conditions
|
Vuppalapati, Navya |
|
|
14 |
3 |
p. 1174-1189 |
artikel |
44 |
New incentive mechanism to enhance cooperation in wireless P2P networks
|
Singha, Nitin |
|
|
14 |
3 |
p. 1218-1228 |
artikel |
45 |
Non-cryptography countermeasure against controllable event triggering attack in WSNs
|
Hu, Haoran |
|
|
14 |
3 |
p. 1071-1087 |
artikel |
46 |
Obfuscation of images via differential privacy: From facial images to general images
|
Croft, William L. |
|
|
14 |
3 |
p. 1705-1733 |
artikel |
47 |
Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks
|
Raj, A. Samson Arun |
|
|
14 |
3 |
p. 1132-1153 |
artikel |
48 |
Privacy-aware smart card based biometric authentication scheme for e-health
|
Chen, Li |
|
|
14 |
3 |
p. 1353-1365 |
artikel |
49 |
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities
|
Pulido-Gaytan, Bernardo |
|
|
14 |
3 |
p. 1666-1691 |
artikel |
50 |
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing
|
Wei, Qianjun |
|
|
14 |
3 |
p. 1379-1387 |
artikel |
51 |
SDN-based offloading policy to reduce the delay in fog-vehicular networks
|
Khadir, Alla Abbas |
|
|
14 |
3 |
p. 1261-1275 |
artikel |
52 |
Surface and high-altitude combined rainfall forecasting using convolutional neural network
|
Zhang, Pengcheng |
|
|
14 |
3 |
p. 1765-1777 |
artikel |
53 |
The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation
|
Ding, Xu |
|
|
14 |
3 |
p. 1748-1764 |
artikel |
54 |
Three-stage Stackelberg game based edge computing resource management for mobile blockchain
|
Fan, Yuqi |
|
|
14 |
3 |
p. 1431-1445 |
artikel |
55 |
Towards software defined low maintenance structured peer-to-peer overlays
|
Shukla, Nitin |
|
|
14 |
3 |
p. 1242-1260 |
artikel |