Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 37, Issue 12December 2022
Bibliometrics
front-matter
Issue Information
research-article
Privacy‐aware PKI model with strong forward security
Abstract

With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy‐aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication ...

research-article
Short‐text feature expansion and classification based on nonnegative matrix factorization
Abstract

In this paper, a non‐negative matrix factorization feature expansion (NMFFE) approach was proposed to overcome the feature‐sparsity issue when expanding features of short‐text. First, we took the internal relationships of short texts and words ...

research-article
Vehicle energy system active defense: A health assessment of lithium‐ion batteries
Abstract

With the wide application of lithium‐ion battery in various fields, the security and reliability of lithium‐ion battery have attracted great attention. Under the mode of continuous development of Internet of vehicles technology, vehicles will be ...

research-article
An ensemble framework for interpretable malicious code detection
Abstract

Malicious code is an ever‐growing security threats to computer systems and networks, while malware detection provides effective defense against malicious codes. In this paper, a brief overview is presented on currently prevalent methods to detect ...

research-article
Privacy‐preserving statistical computing protocols for private set intersection
Abstract

With the rapid development of Internet and the widespread application of distributed computing, people enjoy various conveniences while at the same time their privacy has also been threatened. Secure multiparty computation (MPC) can solve the ...

research-article
Open Access
Intelligent system for depression scale estimation with facial expressions and case study in industrial intelligence
Abstract

As a mental disorder, depression has affected people's lives, works, and so on. Researchers have proposed various industrial intelligent systems in the pattern recognition field for audiovisual depression detection. This paper presents an end‐to‐...

research-article
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
Abstract

For secure communication in a distributed cooperation, generally, the data are encrypted and decrypted using a symmetric key. The process of creating, distributing, storing, deploying, and finally revoking the cryptographic keys is called key ...

research-article
Multigranularity semantics based vulnerability search method for cross‐platform binary
Abstract

Semantic learning is a common method for binary vulnerability detection, which can analyze the assembly structure of the binary code. The existing methods such as control flow graphs and labeled semantic flow graphs perform single semantic ...

research-article
Detection defense against adversarial attacks with saliency map
Abstract

It is well established that neural networks are vulnerable to adversarial examples, which are almost imperceptible on human vision and can cause the deep models misbehave. Such phenomenon may lead to severely inestimable consequences in the safety ...

research-article
License plate recognition using neural architecture search for edge devices
Abstract

The mutually beneficial blend of artificial intelligence with internet of things has been enabling many industries to develop smart information processing solutions. The implementation of technology enhanced industrial intelligence systems is ...

research-article
An IoT‐based human detection system for complex industrial environment with deep learning architectures and transfer learning
Abstract

Artificial intelligence (AI), combined with the Internet of Things (IoT), plays a beneficial role in various fields, including intelligent surveillance applications. With IoT and 5G advancement, intelligent sensors, and devices in the surveillance ...

research-article
A methodological framework for extreme climate risk assessment integrating satellite and location based data sets in intelligent systems
Abstract

Adaptation and resilience practitioners lack guidance on how to understand and manage extreme climate risk using the data available. We present a methodological framework to integrate the satellite as well as location based data sets to estimate ...

research-article
Digital‐twin assisted: Fault diagnosis using deep transfer learning for machining tool condition
Abstract

The rapid development forms a new transition of information technologies to offer an intelligent manufacturing. The manufacturer has revolutionized the stages of product lifecycle including process planning and maintenance for the early detection ...

research-article
Efficient boolean SSE: A novel encrypted database (EDB) for biometric authentication
Abstract

Biometric authentication is up‐and‐coming to replace the traditional identity authentication method (e.g., passwords, PIN, identification cards) for its convenience and intelligence. With more and more users using this method, the database becomes ...

research-article
A range‐free localization algorithm for IoT networks
Abstract

Internet of things (IoT) is a ubiquitous network that helps the system to monitor and organize the world through processing, collecting, and analyzing the data produced by IoT objects. The accurate localization of IoT objects is indispensable for ...

research-article
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework
Abstract

Smart health‐care is the innovation that leads to enhanced diagnostic tools, improved patient treatment, and gadgets that ease the quality of life for majority of people. Textual clinical documents about an individual contain sensitive and ...

research-article
An intelligent system for complex violence pattern analysis and detection
Abstract

Video surveillance has shown encouraging outcomes to monitor human activities and prevent crimes in real time. To this extent, violence detection (VD) has received substantial attention from the research community due to its vast applications, ...

research-article
Graph embedding‐based intelligent industrial decision for complex sewage treatment processes
Abstract

Intelligent algorithms‐driven industrial decision systems have been a general demand for modeling complex sewage treatment processes (STP). Existing researches modeled complex STP with the use of various neural network models, yet neglecting the ...

research-article
Group key agreement protocol among terminals of the intelligent information system for mobile edge computing
Abstract

Security communication and information sharing among mobile devices are important application technologies of the intelligent information system (IIS). Because IIS is vulnerable to attacks, so the security of information sharing among mobile ...

research-article
Privacy budget management and noise reusing in multichain environment
Abstract

To solve the problem of query restriction in supply‐chain financial blockchain system, this paper proposes a privacy budget management and noise reusing method in multichain blockchain environment based on Hyperledger multichannel technology and ...

research-article
HMM‐TCN‐based health assessment and state prediction for robot mechanical axis
Abstract

Aiming at the problems of high manual cost, low efficiency, and low precision of the mechanical axis health management in industrial robot applications, this paper proposes a health assessment and state prediction algorithm based on hidden Markov ...

research-article
A novel image dehazing framework for robust vision‐based intelligent systems
Abstract

Apart from high‐level computer vision tasks, deep learning has also made significant progress in low‐level tasks, including single image dehazing. A well‐detailed image looks realistic and natural with its clear edges and balanced colour. To ...

research-article
Ant colony resource optimization for Industrial IoT and CPS
Abstract

Internet‐of‐Things (IoT) enabled cyber‐physical systems (CPS) is a system in which communication between the physical devices and the cyber environment runs independently without any user interaction. Several optimization algorithms have been used ...

research-article
From SLA to vendor‐neutral metrics: An intelligent knowledge‐based approach for multi‐cloud SLA‐based broker
Abstract

Cloud computing has been consolidated as a support for the vast majority of current and emerging technologies. However, there are some barriers that prevent the exploitation of the full potential of this technology. First, the major cloud ...

research-article
Is semi‐selfish mining available without being detected?
Abstract

Selfish mining attacks get a high prize due to the additional rewards unproportionate to their mining power (mining pools have particular advantages). Generally, this category of attacks stresses decreasing the threshold to maximize the rewards ...

research-article
ELAA: An efficient local adversarial attack using model interpreters
Abstract

Modern deep neural networks are highly vulnerable to adversarial examples, which attracts more and more researchers' attention to craft powerful adversarial examples. Most of these generation algorithms create global perturbations that would ...

research-article
A two‐stream deep neural network‐based intelligent system for complex skin cancer types classification
Abstract

Medical imaging systems installed in different hospitals and labs generate images in bulk, which could support medics to analyze infections or injuries. Manual inspection becomes difficult when there exist more images, therefore, intelligent ...

research-article
Multiple feature fusion‐based video face tracking for IoT big data
Abstract

With the advancement of Internet of Things (IoT) and artificial intelligence technologies, and the need for rapid application growth in fields, such as security entrance control and financial business trade, facial information processing has ...

research-article
HFENet: A lightweight hand‐crafted feature enhanced CNN for ceramic tile surface defect detection
Abstract

Inkjet printing technology can make tiles with very rich and realistic patterns, so it is widely adopted in the ceramic industry. However, the frequent nozzle blockage and inconsistent inkjet volume by inkjet printing devices, usually leads to ...

Comments