Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

A review of the filtering techniques used in EEG signal processing

D Sen, BB Mishra, PK Pattnaik - 2023 7th International …, 2023 - ieeexplore.ieee.org
In this paper, a general overview of the different kinds of filters, their applications in real
world and the various pitfalls of filtering have been briefly discussed with a special focus on …

A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation

Y Peng, Z Lan, K Sun, W Xu - Optics & Laser Technology, 2023 - Elsevier
Chaotic maps are widely used in image encryption due to their characteristics, but many
chaotic maps have the weakness of narrow and discontinuous chaotic range. To solve the …

Cardiovascular Disease Prediction Using Hybrid-Random-Forest-Linear-Model (HRFLM)

AS Sathwik, B Naseeba… - 2023 IEEE World …, 2023 - ieeexplore.ieee.org
Heart complications has become very common disease among all the age group persons
across the globe. The computation techniques available in the market are based different …

Edge computing: A systematic mapping study

J Sakhdari, B Zolfaghari, S Izadpanah… - Concurrency and …, 2023 - Wiley Online Library
Edge computing is a new way of computing that uses resources at the edge of a network to
solve the problem of communication delays in applications that require immediate …

Joint Vehicular Social Semantic Extraction, Transmission and Cache for High QoE Digital Twin

X Ren, J Wu, Q Pan, S Mumtaz - GLOBECOM 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
Digital twins have been extensively explored in vehicular social networks, while wireless
communication quality is limited to support digital twins and their applications due to the …

Trust aware cryptographic role based access control scheme for secure cloud data storage

K Roslin Dayana, P Shobha Rani - Automatika, 2023 - Taylor & Francis
Cloud data storage lets customers store vast amounts of data cheaply on demand.
Cryptographic role-based access control (RBAC) systems preserve cloud data privacy by …

Retracted: Non‐stationary 3‐D GBSM channel model for V2V communications

Y Xu, A Saleem, M Asif, WU Khan… - IET …, 2023 - Wiley Online Library
The above article from IET Communications, published online on 17 October 2022 in Wiley
Online Library (wileyonlinelibrary. com), has been retracted by agreement between the …

An Overview of Information-Centric Network: Concepts, Network Architecture, Comparison, and Difficulties

AC Castillo - Intelligent Communication Technologies and Virtual …, 2023 - Springer
In the past decades, there have been traditional network architectures that were responsible
for routing data between various nodes using different types of IP addresses through a …

An Efficient Approach for Secured Data Transmission Between IoT and Cloud

S Kokate, U Shrawankar - Research Reports on Computer …, 2023 - ojs.wiserpub.com
Abstract The Internet of Things (IoT) network generates a lot of data and cloud servers
collect that data. The server then analyzes the collected data and based on the findings …