Y Zhang, J Li, D Zheng, P Li, Y Tian - Journal of Network and Computer …, 2018 - Elsevier
As an important combination of autonomous vehicle networks (AVNs) and smart grid, the vehicle-to-grid (V2G) network can facilitate the adoption of renewable resources. Based on …
Y Zhang, RH Deng, G Han, D Zheng - Journal of Network and Computer …, 2018 - Elsevier
With the rapid technological advancements in the Internet of Things (IoT), wireless communication and cloud computing, smart health is expected to enable comprehensive …
Y Zhang, J Zhao, D Zheng, K Deng, F Ren, X Zheng… - Sensors, 2018 - mdpi.com
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location …
A Wu, D Zheng, Y Zhang, M Yang - Sensors, 2018 - mdpi.com
Attribute-based encryption can be used to realize fine-grained data sharing in open networks. However, in practical applications, we have to address further challenging issues …
Y Zhang, M Yang, D Zheng, P Lang, A Wu, C Chen - Soft Computing, 2018 - Springer
With recent advancements in wireless smart terminal manufacture and communication technologies, a huge amount of data are generated from a variety of sources including …
D Zheng, K Deng, Y Zhang, J Zhao, X Zheng… - … conference on algorithms …, 2018 - Springer
Abstract Internet of Things (IoT) technologies have attracted enormous attention from academics and industries, and one of the most representative application is the smart grid …
X Feng, J Ma, T Feng, Y Miao, X Liu - IEEE Access, 2018 - ieeexplore.ieee.org
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy. However, the …
Y Zhang, H Su, M Yang, D Zheng… - Security and …, 2018 - Wiley Online Library
The rapid advancements in the Internet of Things (IoT) and cloud computing technologies have significantly promoted the collection and sharing of various data. In order to reduce the …
Protecting sensitive or private information is of the utmost importance. Information breaches, and sharing of sensitive information can have serious legal, reputation and financial impacts …