Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

User trustworthiness in online social networks: A systematic review

M Alkhamees, S Alsaleem, M Al-Qurishi… - Applied Soft …, 2021 - Elsevier
The growing popularity of social networks and their easy acceptance of new users have the
unintended consequence of fostering an environment where anonymous users can act in …

A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing

T Wang, G Zhang, A Liu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT)-Cloud combines the IoT and cloud computing, which not only
enhances the IoT's capability but also expands the scope of its applications. However, it …

A trust-based collaborative filtering algorithm for E-commerce recommendation system

L Jiang, Y Cheng, L Yang, J Li, H Yan… - Journal of ambient …, 2019 - Springer
The rise of e-commerce has not only given consumers more choice but has also caused
information overload. In order to quickly find favorite items from vast resources, users are …

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

S Zhang, X Li, Z Tan, T Peng, G Wang - Future Generation Computer …, 2019 - Elsevier
With the rapid pervasion of location-based services (LBSs), protection of location privacy
has become a significant concern. In most continuous LBSs' privacy-preserving solutions …

Preserving balance between privacy and data integrity in edge-assisted Internet of Things

T Wang, MZA Bhuiyan, G Wang, L Qi… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices and the edge jointly broaden the IoT's sensing capability and
the monitoring scope for various applications. Though accessing sensing data and making …

Truthful incentive mechanism for nondeterministic crowdsensing with vehicles

G Gao, M Xiao, J Wu, L Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we focus on the incentive mechanism design for a vehicle-based,
nondeterministic crowdsensing system. In this crowdsensing system, vehicles move along …

Trust models of internet of smart things: A survey, open issues, and future directions

A Altaf, H Abbas, F Iqbal, A Derhab - Journal of Network and Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is a rapidly growing field which provides seamless
connectivity to physical objects to make them part of smart environment. In order to fully …

A structural evolution-based anomaly detection method for generalized evolving social networks

H Wang, Q Gao, H Li, H Wang, L Yan… - The Computer …, 2022 - academic.oup.com
Recently, text-based anomaly detection methods have obtained impressive results in social
network services, but their applications are limited to social texts provided by users. To …

Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT

RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …