Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- rapid-communicationDecember 2020
AutoRSISC: Automatic design of neural architecture for remote sensing image scene classification
Pattern Recognition Letters (PTRL), Volume 140, Issue CPages 186–192https://doi.org/10.1016/j.patrec.2020.09.034Highlights- A remote sensing image scene classification algorithm base on neural architecture search (NAS) is proposed.
Remote sensing image scene classification (RSISC) is one of the bases of visual question answering for remote sensing data (RSVQA). In the conventional deep learning based solutions of RSISC, domain experts have to manually design the ...
- ArticleNovember 2020
Analysis of Segregated Witness Implementation for Increasing Efficiency and Security of the Bitcoin Cryptocurrency
AbstractThe purpose of this paper is to present mechanisms and algorithms for improving Bitcoin cryptocurrency efficiency, security along with the block propagation times. Specifically, Segregated Witness Implementation (SWI) issues are verified based on ...
- editorialOctober 2020
Multi-access edge computing enabled internet of things: advances and novel applications
Neural Computing and Applications (NCAA), Volume 32, Issue 19Pages 15313–15316https://doi.org/10.1007/s00521-020-05267-xAbstractMulti-access edge computing (MEC) is emerging as a new and promising methodology with the development of Internet of Things (IoT) and smart devices, which enables a large class of applications and has emerged with a significance to change our life,...
- ArticleSeptember 2020
Deep Learning Enabled Reliable Identity Verification and Spoofing Detection
Wireless Algorithms, Systems, and ApplicationsPages 333–345https://doi.org/10.1007/978-3-030-59016-1_28AbstractIdentity spoofing is one of the severe threats in Cyber-Physical Systems (CPS). These attacks can cause hazardous issues if they occur in Air Traffic Control (ATC) or other safety-critical systems. For example, a malicious UAV (Unmanned Aerial ...
- research-articleJuly 2020
Twitter spam account detection based on clustering and classification methods
The Journal of Supercomputing (JSCO), Volume 76, Issue 7Pages 4802–4837https://doi.org/10.1007/s11227-018-2641-xAbstractTwitter social network has gained more popularity due to the increase in social activities of registered users. Twitter performs dual functions of online social network (OSN), acting as a microblogging OSN, and at the same time as a news update ...
- research-articleJune 2020
Data analytics of urban fabric metrics for smart cities
Future Generation Computer Systems (FGCS), Volume 107, Issue CPages 871–882https://doi.org/10.1016/j.future.2018.02.017AbstractComprehensive understanding of the built environment, especially the urban form, is a prerequisite for building a smart city. Data analytics of urban fabric metrics using quantitative methods is critical to understanding a city’s ...
Highlights- A series of morphological indexes of urban blocks are established.
- Statistical ...
- research-articleJune 2020
A lightweight and aggregated system for indoor/outdoor detection using smart devices
Future Generation Computer Systems (FGCS), Volume 107, Issue CPages 988–997https://doi.org/10.1016/j.future.2017.05.028AbstractLocation-based service (LBS) has aroused general interest in both industrial and academic fields. Various scenarios require different localization techniques. Outdoor localization usually needs GPS as the core means and draws support ...
Graphical abstractDisplay Omitted
Highlights- A WiFi sub-detector for indoor/outdoor detection based on weak classifier is developed.
- research-articleJanuary 2020
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
IEEE Communications Surveys & Tutorials (IEEE_ICST), Volume 22, Issue 1Pages 616–644https://doi.org/10.1109/COMST.2019.2953364Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have ...
- research-articleDecember 2019
A Robust Network Traffic Modeling Approach to Software Defined Networking
2019 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM38437.2019.9013538Software Defined Networking (SDN) architecture satisfies the flexibility and scalability requirements of Internet of Things (IoT) network. A large amounts of IoT data is transmitted and exchanged through IoT network. However, many of services of IoT are ...
- research-articleDecember 2019
Fine-Grained Resource Management for Edge Computing Satellite Networks
2019 IEEE Global Communications Conference (GLOBECOM)Pages 1–6https://doi.org/10.1109/GLOBECOM38437.2019.9013467The low earth orbit (LEO) satellite network has been a valuable architecture due to its characteristics of wide coverage and low transmission delay. Utilizing LEO satellites as edge computing nodes to provide real-time services for access terminals will ...
- research-articleDecember 2019
Design of personnel big data management system based on blockchain
Future Generation Computer Systems (FGCS), Volume 101, Issue CPages 1122–1129https://doi.org/10.1016/j.future.2019.07.037AbstractWith the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of ...
Highlights- A method for solving blockchain information redundancy is proposed.
- Analyze the ...
- research-articleOctober 2019
Video tamper detection based on multi-scale mutual information
Multimedia Tools and Applications (MTAA), Volume 78, Issue 19Pages 27109–27126https://doi.org/10.1007/s11042-017-5083-1AbstractVideo frame manipulation has become commonplace with the growing easy access to powerful computing abilities. One of the most common types of video frame tampers is the copy-paste tamper, wherein a region from a video frame is replaced with ...
- research-articleSeptember 2019
Big data‐driven machine learning‐enabled traffic flow prediction
Transactions on Emerging Telecommunications Technologies (TETT), Volume 30, Issue 9https://doi.org/10.1002/ett.3482AbstractReal‐time effective traffic flow big data prediction network has important application significance. Over the past few years, traffic flow data have been exploding and we have entered the big data era. The key challenge of traffic flow prediction ...
image image Real‐time effective traffic flow big data prediction network has important application significance. Over the past few years, traffic flow data have been exploding and we have entered the big data era. This paper proposes a novel traffic flow ...
- research-articleSeptember 2019
Modular exponential multivariate sequence and its application to lightweight security design
Future Generation Computer Systems (FGCS), Volume 98, Issue CPages 435–443https://doi.org/10.1016/j.future.2019.03.040AbstractHow to design an economic lightweight security scheme is emerging as a challenging issue since a larger number of private and confidential datum are generated every day in this big data era. As presented in this paper, dynamic systems ...
Highlights- It analyzes the random behaviors of the iterative multivariate polynomials.
- It ...
- research-articleAugust 2019
Industry practice of coverage-guided enterprise Linux kernel fuzzing
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 986–995https://doi.org/10.1145/3338906.3340460Coverage-guided kernel fuzzing is a widely-used technique that has helped kernel developers and testers discover numerous vulnerabilities. However, due to the high complexity of application and hardware environment, there is little study on deploying ...
- articleAugust 2019
A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems
Journal of Medical Systems (JMSY), Volume 43, Issue 8Pages 1–10https://doi.org/10.1007/s10916-019-1320-7Smart Connected Health Systems (SCHSs) belong to health systems that provide services of health care remotely. They provide the doctors with access to electronic medical records with the aid of medical sensors, smart wearable devices and smart medical ...
- bookJuly 2019
Big Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things
Big Data Analytics in Cyber-Physical Systems: Machine Learning for the Internet of Things examines sensor signal processing, IoT gateways, optimization and decision-making, intelligent mobility, and implementation of machine learning algorithms in ...
- research-articleMay 2019
Domain-specific data mining for residents' transit pattern retrieval from incomplete information
Journal of Network and Computer Applications (JNCA), Volume 134, Issue CPages 62–71https://doi.org/10.1016/j.jnca.2019.02.016AbstractThe rapid development of Cyber-Physical System (CPS) is gradually cultivating a smart world based on Big Data and computational infrastructures. Such reformation has initiated revolutions in various industries and is gradually ...
- research-articleApril 2019
Short-term traffic flow prediction in smart multimedia system for Internet of Vehicles based on deep belief network
Future Generation Computer Systems (FGCS), Volume 93, Issue CPages 460–472https://doi.org/10.1016/j.future.2018.10.052AbstractIn the multimedia system for Internet of Vehicles (IoVs), accurate traffic flow information processing and feedback can give drivers guidance. In traditional information processing for IoVs, few researches deal with traffic flow ...
Highlights- Application of deep learning in short-term traffic flow prediction.
- Proposing a ...
- research-articleFebruary 2019
Innovative Citizen’s Services through Public Cloud in Pakistan: User’s Privacy Concerns and Impacts on Adoption
- Umar Ali,
- Amjad Mehmood,
- Muhammad Faran Majeed,
- Siraj Muhammad,
- Muhammad Kamal Khan,
- Houbing Song,
- Khalid Mahmood Malik
Mobile Networks and Applications (MNET), Volume 24, Issue 1Pages 47–68https://doi.org/10.1007/s11036-018-1132-xAbstractThe world is going to be more and more digital with effective utilization of information and communication technologies in government services to provide services to their citizens. In developing countries, public cloud is now considered a ...