Browse/Search Results: 1-10 of 17

Selected(0)Clear Items/Page:    Sort:
C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT Journal article
IEEE Transactions on Industrial Informatics,2023, volume: 19, issue: 2, pages: 1155-1164
Authors:  Xu, Yang;  Bhuiyan, Md Zakirul Alam;  Wang, Tian;  Zhou, Xiaokang;  Singh, Amit Kumar
Favorite  |  View/Download:7/0  |  Submit date:2023/04/18
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System Journal article
IEEE Transactions on Green Communications and Networking,2021, volume: 6, issue: 1, pages: 313 - 328
Authors:  Xia, ,Zhuoqun;  Zhang, Yichao;  Gu, Ke;  Li, Xiong;  Jia, Wei Jia
Favorite  |  View/Download:10/0  |  Submit date:2022/02/23
DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring Journal article
Information Fusion,2020, volume: 62, pages: 32-46
Authors:  Hai, Tao;  Bhuiyan, Md Zakirul Alam;  Wang, Jing;  Wang, Tian;  Hsu, D. Frank
Favorite  |  View/Download:3/0  |  Submit date:2021/12/02
TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System Journal article
IEEE Transactions on Industrial Informatics,2020, volume: 16, issue: 5, pages: 3311-3321
Authors:  Tao, Hai;  Bhuiyan, Md Zakirul Alam;  Rahman, Md Arafatur;  Wang, Tian;  Wu, Jie
Favorite  |  View/Download:4/0  |  Submit date:2021/12/02
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things Journal article
IEEE Internet of Things Journal,2020, volume: 7, issue: 4, pages: 2679-2689
Authors:  Wang, Tian;  Bhuiyan, Md Zakirul Alam;  Wang, Guojun;  Qi, Lianyong;  Wu, Jie
Favorite  |  View/Download:5/0  |  Submit date:2021/12/02
Survey on Sensor-Cloud Based on Edge Computing 基于边缘计算的传感云研究进展 Review
2019
Authors:  Cao,Zhi Han;  Lu,Yu Cheng;  Lai,Si Si;  Yu,Zhi Yong;  Ma,Ying
Favorite  |  View/Download:3/0  |  Submit date:2021/12/02
A survey on security attacks in VANETs: Communication, applications and challenges Review
2019
Authors:  Arif, Muhammad;  Wang, Guojun;  Bhuiyan, Md Zakirul Alam;  Wang, Tian;  Chen, Jianer
Favorite  |  View/Download:3/0  |  Submit date:2021/12/02
A risk defense method based on microscopic state prediction with partial information observations in social networks Journal article
Journal of Parallel and Distributed Computing,2019, volume: 131, pages: 189-199
Authors:  Wu, You Ke;  Huang, Haiyang;  Wu, Qun;  Liu, Anfeng;  Wang, Tian
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
Secure Data Sequence Query Framework Based on Multiple Fogs Journal article
IEEE Transactions on Emerging Topics in Computing,2019, volume: 9, issue: 4, pages: 1883-1900
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite  |  View/Download:5/0  |  Submit date:2021/05/10
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid Conference paper
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
Authors:  Bhuiyan, Md Zakirul Alam;  Zaman, Mdaliuz;  Wang, Guojun;  Wang, Tian;  Rahman, Md Arafat
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02