Advances on QoS‐aware web service selection and composition with nature‐inspired computing

X Zhao, R Li, X Zuo - CAAI Transactions on Intelligence …, 2019 - Wiley Online Library
Service‐oriented architecture is becoming a major software framework for complex
application and it can be dynamically and flexibly composed by integrating existing …

Eagle strategy using uniform mutation and modified whale optimization algorithm for QoS-aware cloud service composition

H Jin, S Lv, Z Yang, Y Liu - Applied Soft Computing, 2022 - Elsevier
Cloud manufacturing (CMfg) has received increasingly attention from both academia and
industry. Cloud service composition is a critical technique in CMfg that connects different …

Single‐objective service composition methods in cloud manufacturing systems: Recent techniques, classification, and future trends

V Hayyolalam, B Pourghebleh… - Concurrency and …, 2022 - Wiley Online Library
In recent years, cloud manufacturing (CMfg) has been developed as an intelligent
manufacturing system, in which geographically distributed manufacturing resources are …

Cross-lingual multi-keyword rank search with semantic extension over encrypted data

Z Guan, X Liu, L Wu, J Wu, R Xu, J Zhang, Y Li - Information Sciences, 2020 - Elsevier
The emergence of searchable encryption technology sheds new light on the problem of
secure search over encrypted data, which has been a research hotspot in the past few …

Towards automated statistical partial discharge source classification using pattern recognition techniques

H Janani, B Kordi - High Voltage, 2018 - Wiley Online Library
This study presents a comprehensive review of the automated classification in partial
discharge (PD) source identification and probabilistic interpretation of the classification …

An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid

Z Lv, L Wang, Z Guan, J Wu, X Du, H Zhao… - IEEE …, 2019 - ieeexplore.ieee.org
Software-defined network (SDN) is widely used in smart grid for monitoring and managing
the communication network. Big data analytics for SDN-based smart grid has got increasing …

Boosting training for PDF malware classifier via active learning

Y Li, X Wang, Z Shi, R Zhang, J Xue… - International Journal of …, 2022 - Wiley Online Library
Abstract Machine learning algorithms are widely used for cybersecurity applications, include
spam, malware detection. In these applications, the machine learning model has to face …

Network security situation prediction based on MR-SVM

J Hu, D Ma, C Liu, Z Shi, H Yan, C Hu - IEEE Access, 2019 - ieeexplore.ieee.org
The support vector machine (SVM) is verified to be effective for predicting cyber security
situations, however, the long training time of the prediction model is a drawback to its use …

[HTML][HTML] A hierarchical blockchain-enabled security-threat assessment architecture for iov

Y Liu, L Pan, S Chen - Digital Communications and Networks, 2023 - Elsevier
Abstract In Internet of Vehicles (IoV), the security-threat information of various traffic
elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy …

Blockchain-based asymmetric group key agreement protocol for internet of vehicles

Q Zhang, Y Li, R Wang, J Li, Y Gan, Y Zhang… - Computers & Electrical …, 2020 - Elsevier
Data sharing and group communication are the main applications for Internet of Vehicles
(IoV). IoV has some obvious characteristics, such as terminals resources are limited …