Z Liao, X Pang, J Zhang, B Xiong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and forensics represent two key components for network management, especially to guarantee the trusted operation of massive access networks such as the Internet of Things …
In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications …
Network trustworthiness is considered a very crucial element in network security and is developed through positive experiences, guarantees, clarity, and responsibility …
Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish …
R Wang, M Luo, Y Wen, L Wang… - Security and …, 2021 - Wiley Online Library
There has been increased interest in applying artificial intelligence (AI) in various settings to inform decision‐making and facilitate predictive analytics. In recent times, there have also …
With the rapid growth of edge-assisted solutions in Internet of Things (IoT) networks, connected healthcare progressively relies on such solutions. This refers to systems in which …
Y Guo, Q Wang, T Ji, X Wang… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
With the advance in artificial intelligence and high-dimensional data analysis, federated learning (FL) has emerged to allow distributed data providers to collaboratively learn without …
F Chen, G Yuanbo, W Yifeng… - Journal on …, 2021 - search.ebscohost.com
Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge …