0 | -- | 0 | Vinod Kumar, Rakesh Kumar Jha, Sanjeev Jain. ANGUISH: Security attack in narrowband-Internet of Things (NB-IoT) using game theory and hardware analysis |
0 | -- | 0 | Sudip Maitra, Venkata P. Yanambaka, Deepak Puthal, Ahmed Abdelgawad, Kumar Yelamarthi. Integration of Internet of Things and blockchain toward portability and low-energy consumption |
0 | -- | 0 | Jiawei Tan, Wei Liu 0077, Tian Wang 0001, Ming Zhao 0007, Anfeng Liu, Shaobo Zhang. A high-accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology |
0 | -- | 0 | Arpita Bhargava, Shekhar Verma. DEIT: Dempster Shafer Theory-based edge-centric Internet of Things-specific trust model |
0 | -- | 0 | Amanpreet Singh, Maninder Kaur. Cuckoo inspired stacking ensemble framework for content-based cybercrime detection in online social networks |
0 | -- | 0 | Saptarshi Ghosh 0005, Muddesar Iqbal, Tasos Dagiuklas. A centralized hybrid routing model for multicontroller SD-WANs |
0 | -- | 0 | João B. A. Gomes, Joel J. P. C. Rodrigues, Ricardo A. L. Rabêlo, Sudeep Tanwar, Jalal Al-Muhtadi, Sergey Kozlov. A novel Internet of things-based plug-and-play multigas sensor for environmental monitoring |
0 | -- | 0 | V. D. Ambeth Kumar, Abhishek Kumar, Ranbir Singh Batth, Mamoon Rashid, Sachin Kumar Gupta, Manish Raghuraman. Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm |
0 | -- | 0 | Zhenquan Qin, Xu Xia, Bingxian Lu, Chen Qian, Lei Wang 0005, Chuan Lin 0001. Traffic data reconstruction based on compressive sensing with neighbor regularization |
0 | -- | 0 | Bhoopesh Singh Bhati, Garvit Chugh, Fadi Al-Turjman 0001, Nitesh Singh Bhati. An improved ensemble based intrusion detection technique using XGBoost |
0 | -- | 0 | Jun Zeng, Xin He, Haoran Tang, Junhao Wen. Predicting the next location: A self-attention and recurrent neural network model with temporal context |
0 | -- | 0 | Sourav Saha 0002, Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das. Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment |
0 | -- | 0 | Shichang Xuan, ZhiYu Chen, Ilyong Chung, Haowen Tan, Dapeng Man, Xiaojiang Du, Wu Yang 0001, Mohsen Guizani. ECBCM: A prestige-based edge computing blockchain security consensus model |
0 | -- | 0 | Honghao Gao, Yuyu Yin, Guangjie Han, Wenbing Zhao 0001. Edge computing: Enabling technologies, applications, and services |
0 | -- | 0 | Suleman khan, Kashif Kifayat, Ali Kashif Bashir, Andrei Gurtov, Mehdi Hassan. Intelligent intrusion detection system in smart grid using computational intelligence and machine learning |
0 | -- | 0 | Prabhat Kumar, Randhir Kumar, Govind P. Gupta, Rakesh Tripathi. A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing |
0 | -- | 0 | Rajesh Gupta 0007, Aparna Kumari, Sudeep Tanwar. A taxonomy of blockchain envisioned edge-as-a-connected autonomous vehicles |
0 | -- | 0 | Mohit Mittal, Celestine Iwendi, Suleman khan, Abdul Rehman Javed. Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system |
0 | -- | 0 | Ahmed Demirpolat, Alper Kaan Sarica, Pelin Angin. ProtÉdge: A few-shot ensemble learning approach to software-defined networking-assisted edge security |
0 | -- | 0 | Vinay Bhardwaj, Navdeep Kaur, Sahil Vashisht, Sushma Jain. SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks |
0 | -- | 0 | Yusuf Muhammad Tukur, Dhavalkumar Thakker, Irfan-Ullah Awan. Edge-based blockchain enabled anomaly detection for insider attack prevention in Internet of Things |
0 | -- | 0 | Muhammad Ahmad Rathore, Muhammad Usman 0012, JongWon Kim 0001. Maintaining SmartX multi-view visibility for OF@TEIN+ distributed cloud-native edge boxes |
0 | -- | 0 | Anshu Thakur, Ashok Kumar, Nitin Gupta 0006. Secrecy analysis of multiple-input multiple-output underlay cognitive radio networks with energy harvesting |
0 | -- | 0 | Gagangeet Singh Aujla, Neeraj Kumar 0001, Biplab Sikdar, Kim-Kwang Raymond Choo. Security and privacy solutions in edge envisioned connected things environment |
0 | -- | 0 | Kun Zhao, Xiaoxian Yang, Wei Xi, Zhiping Jiang, Xiaohong Wang, Zhi Wang 0002, Xinyuan Ji, Zhao Yang, Jizhong Zhao. HCAR: Human continuous activity recognition using latent structure features |
0 | -- | 0 | Xiaoming Yuan, Zheyu Zhao, Haiyang Wang, Lin Zhang, Amir Taherkordi, Hua Yu. MDMH: An improved multi-attribute decision-making and highest response ratio next-based computation offloading approach for wireless body area networks |
0 | -- | 0 | Liang Chen 0001, Yangjun Xu, Fenfang Xie, Min Huang, Zibin Zheng. Data poisoning attacks on neighborhood-based recommender systems |
0 | -- | 0 | Peiying Zhang, Fanglin Liu, Sahil Vashisht, Ravinder Singh Mann. A robust network measurement and feature selection strategy for software-defined edge computing environment |
0 | -- | 0 | Yu Li, Wenjian Xu. Utilizing the column imprints to accelerate no-partitioning hash joins in large-scale edge systems |
0 | -- | 0 | Junluo Yin, Xiong Luo, Yueqin Zhu, Weiping Wang 0007, Long Wang 0015, Chao Huang 0002, Jenq-Haur Wang. An edge computing-based predictive evaluation scheme toward geological drilling data using long short-term memory network |
0 | -- | 0 | Zhongqin Bi, Yuanyuan Ma, Xiaoxian Yang, Ping Zhou. Research on wireless robot path planning under edge computing considering multistep searching and inflection points |