Abstract is missing.
- A Blockchain-Based Secure Fog-Cloud Architecture for Internet of ThingsMahmudul Hassan Ashik, Tariqul Islam, Kamrul Hasan, Kiho Lim. 1-3 [doi]
- No-Sum IPsec Lite: Simplified and lightweight Internet security protocol for IoT devicesBharat S. Rawal, Sai Tarun Gollapudi. 4-9 [doi]
- Fog Computing and the Internet of Things (IoT): A ReviewManoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert. 10-12 [doi]
- Performance Enhancing Secure Erasure Code (PESEC) for Cloud Storage using Random N Blocks EncryptionAatish Chiniah, Utam Avinash Einstein Mungur. 13-17 [doi]
- A Blockchain-based Framework for Information Management in Internet of VehiclesXiaoqing Wen, Zhenyu Guan, Dawei Li, Hanzheng Lyu, Huimin Li. 18-23 [doi]
- Microservice Selection in Edge-Cloud Collaborative Environment: A Deep Reinforcement Learning ApproachFeiyan Guo, Bing Tang, Mingdong Tang, Hui Zhao, Wei Liang 0005. 24-29 [doi]
- Research on Multi-path Network in Cloud Computing Based on SCTPLi Zheng, Xu Zhang, Sujuan Zhang, Xuhui Chen. 30-35 [doi]
- Ceramic Anti-Counterfeiting Technology Identification Method Based on BlockchainXinxin Liu, Xien Cheng, Chenyang Liao, Jiaren Chen, Xinyu Li, Kexin Liu. 36-41 [doi]
- Taxonomy of Challenges in Cloud SecurityTarik Eltaeib, Nazrul Islam. 42-46 [doi]
- Secure Neural Network in Federated Learning with Model Aggregation under Multiple KeysZoe Lin Jiang, Hui Guo, Yijian Pan, Yang Liu, Xuan Wang, Jun Zhang. 47-52 [doi]
- Security and Privacy Challenges in 5G-enabled TechnologyYash Patel, Bharat S. Rawal, Yunkai Liu, Md Tajmilur Rahman. 53-58 [doi]
- A Malicious Android Malware Detection System based on Implicit Relationship MiningZijun Xu, Meng Li, Yiming Hei, Peiran Li, Jianwei Liu 0001. 59-64 [doi]
- Network Intrusion Detection Based on Subspace Clustering and BP Neural NetworkShuyu Chen, Wei Li, Jun Liu, Haoyu Jin, Xuehui Yin. 65-70 [doi]
- Partially Homomorphic Encryption Scheme for Real-Time Image StreamAngel Vazquez-Salazar, Ali Ahmadinia. 71-76 [doi]
- Domain Generating Algorithm based Malicious Domains DetectionMd. Ahsan Ayub, Steven Smith, Ambareen Siraj, Paul Tinker. 77-82 [doi]
- Network Protocol Reverse Parsing Based on Bit StreamYang Li, Liyun Bai, Mingqi Zhang, Siyuan Wang, Jing Wu, Hao Jiang. 83-90 [doi]
- One WS-Management Based CoT System Management Model in Edge Computing EnvironmentXiaoli Wan, Wenli Li, Zhihui Lu 0002, Xiaohua Xuan, Jie Cheng. 91-96 [doi]
- Prediction and Detection of Cyberattacks using AI Model in Virtualized Wireless NetworksNaveen Naik Sapavath, Eric Muhati, Danda B. Rawat. 97-102 [doi]
- Custom Computing Design and Implementation for Multiple Dedispersion with GPUXiangcong Kong, Xiaoying Zheng, Yongxin Zhu 0001, Qinrun Zhang, Ying Huang. 103-108 [doi]
- Research on Load-balancing Index Algorithm for Smart Grid SystemYun Su, Zenghui Yang, Naiwang Guo. 109-114 [doi]
- Subway Flow Prediction Based on Improved Support Vector MachineChuang Ma, Sishi Qin, Jinhao Hu, Li Yan. 115-120 [doi]
- A Smart and Safe Robot System for Electric MonitoringQunchao Bi, Taibin Zhou, Huanhuan Lai, Jiajia Huang, Duxi Zhang, Yinqiang Huang, Bo Li. 121-126 [doi]
- Blockchain-Based Access Control ApproachesYizhong Liu, Meikang Qiu, Jianwei Liu, Meiqin Liu. 127-132 [doi]
- Whisper: A Curious Case of Valid and Employed Mallory in Cloud ComputingRipon Patgiri. 133-138 [doi]
- A Survey on Cloudlets, Mobile Edge, and Fog ComputingManoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert. 139-142 [doi]
- Optimizing the Allocation of Secure Fog Resources based on QoS RequirementsKeith Massey, Nadia Moazen, Talal Halabi. 143-148 [doi]
- Machine Learning Based Network CensorshipXiangyu Gao, Meikang Qiu, Meiqin Liu. 149-154 [doi]
- Random Partition Region for Location Privacy Protection on Edge ComputingWenxiu Sui, Zhaobin Liu, Haoze Lv, Zhiyang Li 0001, Weijiang Liu. 155-160 [doi]
- Parameters Compressed Mechanism in Federated Learning for Edge ComputingYongqiang Lu, Zhaobin Liu, Yiming Huang. 161-166 [doi]
- Handoff of Satellite Network for High-Speed Mobile Terminals Based on Edge ComputingPengcheng Zhou, Yun Liu, Lei Guo, Ningning Lu, Jing Wu, Hao Jiang. 167-175 [doi]
- A Distributed Dependency-Aware Offloading Scheme for Vehicular Edge Computing Based on Policy GradientHaoqiang Liu, Hongbo Zhao, Liwei Geng, Yujie Wang, Wenquan Feng. 176-181 [doi]
- An edge data access control scheme suitable for wireless smart grid environmentBin Zhang, Chong Wang, Yumin Chen, Jian Fu, Yangjun Zhou. 182-187 [doi]
- A Secure Identity Authentication Protocol for Edge Data in Smart Grid EnvironmentLijun Xiao, Jiahong Cai, Meikang Qiu, Meiqin Liu. 188-193 [doi]
- Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of VehiclesJunhai Zhou, Haihan Wu, Yaping Lin, Wei Liang, Qin Liu 0001. 194-199 [doi]
- Deep Reinforcement Learning-based Computation Offloading in Vehicular NetworksLiwei Geng, Hongbo Zhao, Haoqiang Liu, Yujie Wang, Wenquan Feng, Lu Bai. 200-206 [doi]
- A Cloud-Edge Collaborative Intelligent Fault Diagnosis Method Based on LSTM-VAE Hybrid ModelShaofei Lu, Xiaolin Tang, Yajun Zhu, Jingke She. 207-212 [doi]
- Identification Method of Ancient Ceramics RevisionJinjing Ma, Yongkang Peng, Wenfang Cheng, Meikang Qiu, Yu Nie. 213-218 [doi]
- A Data Middle Platform Architecture Based on Microservice Serving Power Grid BusinessGuangxian Lyu, Peng Liu, Yiming Lu, Tianyou Wang, Xianguo Kang. 219-224 [doi]
- Attention Based Multi-Unit Spatial-Temporal Network for Traffic Flow ForecastingChuang Ma, Xinting Hu, Shuaiwu Liu, Lei Liu. 225-230 [doi]