Design and performance evaluation of content-oriented communication system for IoT network: A case study of named node networking for real-time video streaming …

X Qi, Y Su, K Yu, J Li, Q Hua, Z Wen, J Lopez… - IEEE …, 2019 - ieeexplore.ieee.org
Information-Centric Networking (ICN) was born in an era that more and more users are
shifting their interests to the content itself rather than the location where contents are stored …

ECOSECURITY: Tackling challenges related to data exchange and security: An edge-computing-enabled secure and efficient data exchange architecture for the …

Z Guan, Y Zhang, G Si, Z Zhou, J Wu… - IEEE Consumer …, 2019 - ieeexplore.ieee.org
As a distributed, heterogeneous, and pluralistic energy network, the Energy Internet has
emerged as a promising solution to resolve the critical issues of environmental pollution and …

PARC: Placement availability resilient controller scheme for software-defined datacenters

R Chaudhary, N Kumar - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
Software-Defined Datacenters (SDDC) have been widely used for load-aware data
management for different applications across the globe. Due to its centralized architecture …

A novel content popularity prediction algorithm based on auto regressive model in information-centric IoT

Y Liu, T Zhi, H Xi, X Duan, H Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
As information-centric networking (ICN) cache can effectively reduce the requests from
customers to producers and improve the efficiency of content acquisition, there are many …

Improved PBFT algorithm based on reputation and voting mechanism

J Chen, X Zhang, P Shangguan - Journal of Physics: Conference …, 2020 - iopscience.iop.org
Aiming at the problems of large communication cost of the consistency process, low
efficiency of view switching and the random selection of the master node in the Practical …

Discovering suspicious APT families through a large-scale domain graph in information-centric IoT

Z Ma, Q Li, X Meng - IEEE Access, 2019 - ieeexplore.ieee.org
In recent years, a type of cyberattacks, known as advanced persistent threats, has resulted in
very serious losses to various organizations such as governments and enterprises. The APT …

Hypergraph Based Joint Channel and Power Resource Allocation for Cross-cell M2M Communication in IIoT

C Zhuansun, K Yan, G Zhang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is the leading application scenario of the fifth generation
wireless communication systems (5G) and beyond. Nonorthogonal multiple access (NOMA) …

Clustering and Optimization Based on Hybrid Artificial Bee Colony and Differential Evolution Algorithm in Big Data

SA Sivakumar - Research Journal of Computer Systems and …, 2021 - technicaljournals.org
Big data is increasingly being employed in a variety of fields because it can handle the
difficulties associated with processing massive amounts of data, including business …

DRL-Driven Digital Twin Function Virtualization for Adaptive Service Response in 6G Networks

Y Tao, J Wu, X Lin, W Yang - IEEE Networking Letters, 2023 - ieeexplore.ieee.org
Digital twin networks (DTN) simulate and predict 6G network behaviors to support innovative
6G services. However, emerging 6G service requests are rapidly growing with dynamic …

A survey of artificial intelligence in cybersecurity

K Morovat, B Panda - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
During the last decades, not only the number of cyberattacks have increased significantly,
they have also become more sophisticated. Hence designing a cyber-resilient approach is …