CIM: CP-ABE-based identity management framework for collaborative edge storage

C Li, L Wang, J Li, Y Fei - Peer-to-Peer Networking and Applications, 2024 - Springer
Collaborative edge storage (CES) can provide high-quality data sharing for end users
through the collaborative use of edge storage resources. However, due to the lack of trust …

[HTML][HTML] A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks

A Almalawi, S Hassan, A Fahad, AI Khan - International Journal of …, 2024 - Springer
As Edge AI systems become more prevalent, ensuring data privacy and security in these
decentralized networks is essential. In this work, a novel hybrid cryptographic mechanism …

A Non-Parametric Scheme for Identifying Data Characteristic Based on Curve Similarity Matching

Q Ge, Y Cheng, H Li, Z Ye, Y Zhu… - IEEE/CAA Journal of …, 2024 - ieeexplore.ieee.org
For accurately identifying the distribution characteristic of Gaussian-like noises in unmanned
aerial vehicle (UAV) state estimation, this paper proposes a non-parametric scheme based …

Effective privacy preserving model based on adversarial CNN with IBOA in the social IoT systems for CEC

PK Shukla, SV Pandit, C Gandhi… - International Journal …, 2024 - Wiley Online Library
In the present scenario, the social Internet of Things (IoT) is one of the emerging
technologies in combination with collaborative edge computing (CEC). The CEC solves the …

[HTML][HTML] Fuzzy-based privacy-preserving scheme of low consumption and high effectiveness for IoTs: a repeated game model

L Cao, M Zhu - Sensors, 2022 - mdpi.com
In the Internet of things (IoTs), data transmission via network coding is highly vulnerable to
intra-generation and inter-generation pollution attacks. To mitigate such attacks, some …

[PDF][PDF] Traffic Flow Prediction with Heterogenous Data Using a Hybrid CNN-LSTM Model.

JD Wang, CON Susanto - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Predicting traffic flow is a crucial component of an intelligent transportation system. Precisely
monitoring and predicting traffic flow remains a challenging endeavor. However, existing …

Deep Learning–based Dynamic User Alignment in Social Networks

K Matrouk, SV, S Kumar, MK Bhadla… - ACM Journal of Data …, 2023 - dl.acm.org
Academics and businesses are paying intense attention to social network alignment, which
centers various social networks around their shared members. All studies to date treat the …

Data Privacy Protection Model Based on Graph Convolutional Neural Network

T Gu, L Yang, H Wang - Mobile Networks and Applications, 2023 - Springer
In order to solve the problem of leakage of user data privacy in social network scenarios, the
author proposes a data privacy protection model based on graph convolutional neural …

Secure Crowdsourced Blockchain Computation Intelligence for IoT Systems

X Zhang, X Feng, H Zhang, B Mi… - 2023 24th IEEE …, 2023 - ieeexplore.ieee.org
With the rapid development of scientific and technological revolution, the Internet of Thing
systems have been widely deployed in many vertical domains such as smart cities, smart …

[HTML][HTML] Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache

Z Liu, Q Liu, J Wei, D Miao, J Wang - Information, 2022 - mdpi.com
With the rapid development of the Internet of Things, location-based services have emerged
in many social and business fields. In obtaining the service, the user needs to transmit the …