A survey of blockchain and intelligent networking for the metaverse

Y Fu, C Li, FR Yu, TH Luan, P Zhao… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The virtual world created by the development of the Internet, computers, artificial intelligence
(AI), and hardware technologies have brought various degrees of digital transformation to …

A long short‐term memory‐based model for greenhouse climate prediction

Y Liu, D Li, S Wan, F Wang, W Dou, X Xu… - … Journal of Intelligent …, 2022 - Wiley Online Library
Greenhouses can grow many off‐season vegetables and fruits, which improves people's
quality of life. Greenhouses can also help crops resist natural disasters and ensure the …

An attention‐based category‐aware GRU model for the next POI recommendation

Y Liu, A Pei, F Wang, Y Yang, X Zhang… - … Journal of Intelligent …, 2021 - Wiley Online Library
With the continuous accumulation of users' check‐in data, we can gradually capture users'
behavior patterns and mine users' preferences. Based on this, the next point‐of‐interest …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing

S Tu, M Waqas, F Huang, G Abbas, ZH Abbas - Computer Networks, 2021 - Elsevier
Fog computing is a revolutionary technology for the next generation to bridge the gap
between cloud data centers and end-users. Fog computing is not a counterfeit for cloud …

Tensor recurrent neural network with differential privacy

J Feng, LT Yang, B Ren, D Zou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recurrent neural network (RNN), a branch of deep learning, is a powerful model for
sequential data that has outstanding performance on a wide range of important Internet of …

Security of federated learning for cloud‐edge intelligence collaborative computing

J Yang, J Zheng, Z Zhang, QI Chen… - … Journal of Intelligent …, 2022 - Wiley Online Library
Federated Learning (FL) is one of the key technologies to solve privacy protection for cloud‐
edge intelligent collaborative computing, and its security and privacy issues have attracted …

MobiHisNet: A lightweight CNN in mobile edge computing for histopathological image classification

A Kumar, A Sharma, V Bharti, AK Singh… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Recent advances in artificial intelligence (AI), especially convolutional neural networks
(CNNs), alongside the digitization of histopathological images, have made the computer …

An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption

G Xu, J Zhang, UGO Cliff, C Ma - International Journal of …, 2022 - Wiley Online Library
As a distributed ledger technology, blockchain has excellent openness and transparency,
which can provide data security management services for distributed intelligent systems and …

STSIIML: Study on token shuffling under incomplete information based on machine learning

Y Wang, T Li, M Liu, C Li… - International Journal of …, 2022 - Wiley Online Library
Transaction data on the public chain is open and transparent to all participants, which poses
a potential threat to the privacy of participants. Some privacy‐conscious token holders want …