[HTML][HTML] A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

Management and orchestration of edge computing for iot: A comprehensive survey

Y Chiang, Y Zhang, H Luo, TY Chen… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the development of telecommunication technologies and the proliferation of network
applications in the past decades, the traditional cloud network architecture becomes unable …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

A new privacy preservation mechanism and a gain iterative disturbance observer for multiagent systems

M Wang, H Liang, Y Pan, X Xie - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
A new privacy preservation mechanism and a gain iterative disturbance observer are
proposed for multiagent systems. The proposed privacy protection mechanism can realize …

A privacy-preserving federated learning for multiparty data sharing in social IoTs

L Yin, J Feng, H Xun, Z Sun… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As 5G and mobile computing are growing rapidly, deep learning services in the Social
Computing and Social Internet of Things (IoT) have enriched our lives over the past few …

A blockchain-based machine learning framework for edge services in IIoT

Y Tian, T Li, J Xiong, MZA Bhuiyan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge services provide an effective and superior means of real-time transmissions and rapid
processing of information in the Industrial Internet of Things (IIoT). However, the continuous …

TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT

Q Li, B Xia, H Huang, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …

Real-time detection method for small traffic signs based on Yolov3

H Zhang, L Qin, J Li, Y Guo, Y Zhou, J Zhang… - Ieee …, 2020 - ieeexplore.ieee.org
It is very challenging to detect traffic signs using a high-precision real-time approach in
realistic scenes with respect to driver-assistance systems for driving vehicles and …

A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning

Y Ren, W Liu, A Liu, T Wang, A Li - Future generation computer systems, 2022 - Elsevier
The crowdsourcing scheme emerges as a promising solution for data-based application in
the Internet of Things (IoT) network by dividing the large-scale complex sensing tasks into …

A blockchain-based secure key management scheme with trustworthiness in DWSNs

Y Tian, Z Wang, J Xiong, J Ma - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
Dynamic wireless sensor networks (DWSNs) as an important means of industrial data
collection are a key part of industrial Internet of Things (IIoT), where security and reliability …