[HTML][HTML] Fog computing: An overview of big IoT data analytics

MR Anawar, S Wang, M Azam Zia… - … and Mobile Computing, 2018 - hindawi.com
A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially
based on nonstop operational states. Those IoT devices are generating an avalanche of …

A survey on deep learning for ultra-reliable and low-latency communications challenges on 6G wireless systems

A Salh, L Audah, NSM Shah, A Alhammadi… - IEEE …, 2021 - ieeexplore.ieee.org
The sixth generation (6G) wireless communication network presents itself as a promising
technique that can be utilized to provide a fully data-driven network evaluating and …

Performance analysis of FD-NOMA-based decentralized V2X systems

D Zhang, Y Liu, L Dai, AK Bashir… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In order to meet the requirements of massively connected devices, different quality of
services (QoS), various transmit rates, and ultra-reliable and low latency communications …

A user-centric data protection method for cloud storage based on invertible DWT

H Qiu, H Noura, M Qiu, Z Ming… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Protection on end users' data stored in Cloud servers becomes an important issue in today's
Cloud environments. In this paper, we present a novel data protection method combining …

Low-rate DDoS attack detection based on factorization machine in software defined network

W Zhijun, X Qing, W Jingjie, Y Meng, L Liang - IEEE Access, 2020 - ieeexplore.ieee.org
As the Software Define Network (SDN) adopts centralized control logic, it is vulnerable to
various types of Distributed Denial of Service (DDoS) attacks. At present, almost all the …

Application-aware consensus management for software-defined intelligent blockchain in IoT

J Wu, M Dong, K Ota, J Li, W Yang - IEEE Network, 2020 - ieeexplore.ieee.org
Currently, IoT has become an important carrier of blockchains, which not only makes
blockchain more ubiquitous but also improves the security of IoT. Consensus is the core …

EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid

Z Guan, Y Zhang, L Zhu, L Wu, S Yu - Science China Information Sciences, 2019 - Springer
Smart grid is considered as a promising approach to solve the problems of carbon emission
and energy crisis. In smart grid, the power consumption data are collected to optimize the …

HERO: Human emotions recognition for realizing intelligent Internet of Things

W Hua, F Dai, L Huang, J Xiong, G Gui - IEEE Access, 2019 - ieeexplore.ieee.org
Human emotions recognition (HERO) is considered as one of the important techniques for
realizing the intelligent Internet of Things. The demand for a robust and precise facial …

EMS: An energy management scheme for green IoT environments

O Said, Z Al-Makhadmeh, AMR Tolba - IEEE access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has important applications in all aspects of our lives in areas
such as business, military, security, and health. It is known that most IoT node designs are …

Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes.

M Khurana, S Shivani, S Tiwari… - Adhoc & Sensor …, 2020 - search.ebscohost.com
Nowadays, in wireless sensor networks, Time synchronization is the most critical problem. In
real-time scenarios, sensor nodes need an optimized time synchronization technique to …