A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory

Y Wu, HN Dai, H Wang, Z Xiong… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Network slicing has been widely agreed as a promising technique to accommodate diverse
services for the Industrial Internet of Things (IIoT). Smart transportation, smart energy, and …

Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0

Y Wu, HN Dai, H Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Critical infrastructure systems are vital to underpin the functioning of a society and economy.
Due to the ever-increasing number of Internet-connected Internet-of-Things (IoT)/Industrial …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Xblock-eth: Extracting and exploring blockchain data from ethereum

P Zheng, Z Zheng, J Wu, HN Dai - IEEE Open Journal of the …, 2020 - ieeexplore.ieee.org
Blockchain-based cryptocurrencies have received extensive attention recently. Massive data
has been stored on permission-less blockchains. The analysis of massive blockchain data …

[HTML][HTML] An optimal fog-cloud offloading framework for big data optimization in heterogeneous IoT networks

S Bebortta, SS Tripathy, UM Modibbo, I Ali - Decision Analytics Journal, 2023 - Elsevier
Executing complex and time-sensitive operations has become difficult due to the increased
acceptance of Internet of Things (IoT) devices and IoT-generated big data, which can result …

Game theory and reinforcement learning based secure edge caching in mobile social networks

Q Xu, Z Su, R Lu - IEEE Transactions on Information Forensics …, 2020 - ieeexplore.ieee.org
Edge caching has become one of promising technologies in mobile social networks (MSNs)
to proximally provide popular contents for mobile users. However, since caching contents …

ATTDC: An active and traceable trust data collection scheme for industrial security in smart cities

M Shen, A Liu, G Huang, NN Xiong… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With billions of sensing devices are deployed in smart cities to monitor regions of interests
and collect large sensing data, the Internet-of-Things (IoT) applications are being widely …

More than privacy: Adopting differential privacy in game-theoretic mechanism design

L Zhang, T Zhu, P Xiong, W Zhou, PS Yu - ACM Computing Surveys …, 2021 - dl.acm.org
The vast majority of artificial intelligence solutions are founded on game theory, and
differential privacy is emerging as perhaps the most rigorous and widely adopted privacy …

Accelerating parallel Jacobi method for matrix eigenvalue computation in DOA estimation algorithm

Z Shi, Q He, Y Liu - IEEE Transactions on Vehicular Technology, 2020 - ieeexplore.ieee.org
The calculation of eigenvalues of a matrix is required by many algorithms. Specifically, it is
the key technique in subspace-based direction of arrival (DOA) estimation algorithms, eg …