Internet of Things (IoT): From awareness to continued use

A Koohang, CS Sargent, JH Nord… - International Journal of …, 2022 - Elsevier
This paper proposes a research model with five constructs, ie, IoT awareness, users' IoT
privacy knowledge, users' IoT security knowledge, users' IoT Trust, and continued intention …

Design and Implementation of SEMAR IoT Server Platform with Applications

YYF Panduman, N Funabiki, P Puspitaningayu… - Sensors, 2022 - mdpi.com
Nowadays, rapid developments of Internet of Things (IoT) technologies have increased
possibilities of realizing smart cities where collaborations and integrations of various IoT …

FPC: Filter pruning via the contribution of output feature map for deep convolutional neural networks acceleration

Y Chen, X Wen, Y Zhang, Q He - Knowledge-Based Systems, 2022 - Elsevier
Pruning is a very effective solution to alleviate the difficulty of deploying neural networks on
resource-constrained devices. However, most of the existing methods focus on the inherent …

X-Education: Education of All Things with AI and Edge Computing—One Case Study for EFL Learning

WY Hwang, R Nurtantyana - Sustainability, 2022 - mdpi.com
Education usually only focuses on how to educate human beings with pedagogical or
technical support. However, with artificial intelligence (AI) and edge computing, education …

Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT

Z Cai, J Wu - Peer-to-Peer Networking and Applications, 2023 - Springer
With the popularization of 5G, the number of mobile devices has gone through explosive
growth, the information and contents in the network have become richer, and the scale of the …

Toward data transmission security based on proxy broadcast re-encryption in edge collaboration

Q Zhang, J Cui, H Zhong, L Liu - ACM Transactions on Sensor Networks …, 2022 - dl.acm.org
With the development of IoT, more and more data is offloaded from the cloud to the edge for
computing, eventually forming a collaborative computing model at the edge. However, in this …

Application of Internet of Things and Blockchain in Information Security and Privacy Protection of Global Organizations

S Fang, Q Liu, F Zhang, N Chen, X Li - Journal of Organizational and …, 2023 - igi-global.com
Access control data will continue to be exposed to the threat of privacy leakage even if
blockchain technology currently offers a new solution for the security and privacy of the …

[HTML][HTML] A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation

M Arazzi, S Nicolazzo, A Nocera - Pervasive and Mobile Computing, 2024 - Elsevier
The pervasiveness and high number of Internet of Things (IoT) applications in people's daily
lives make this context a very critical attack surface for cyber threats. The high heterogeneity …

Deep AI-powered cyber threat analysis in IIoT

I Bibi, A Akhunzada, N Kumar - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Distributed Industrial Internet of Things (IIoT) has entirely revolutionized the industrial sector
that varies from autonomous industrial processes to automation of processes without human …

Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network

JK Samriya, S Kumar, M Kumar, M Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The rapid integration of Internet of Things (IoT) services and applications across various
sectors is primarily driven by their ability to process real-time data and create intelligent …