Blockchain based credibility verification method for IoT entities

C Qu, M Tao, J Zhang, X Hong… - Security and …, 2018 - Wiley Online Library
With the fast development of mobile Internet, Internet of Things (IoT) has been found in many
important applications recently. However, it still faces many challenges in security and …

Privacy protection and intrusion avoidance for cloudlet-based medical data sharing

M Chen, Y Qian, J Chen, K Hwang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the popularity of wearable devices, along with the development of clouds and cloudlet
technology, there has been increasing need to provide better medical care. The processing …

SBAC: A secure blockchain-based access control framework for information-centric networking

Q Lyu, Y Qi, X Zhang, H Liu, Q Wang… - Journal of Network and …, 2020 - Elsevier
The information-centric networking (ICN) has been proposed to meet the increasing demand
for efficient content delivery. However, the in-network caching mechanism of ICN makes it …

Telesurgery robot based on 5G tactile internet

Y Miao, Y Jiang, L Peng, MS Hossain… - Mobile Networks and …, 2018 - Springer
With the development of modern medical technology, the emerging 5G, tactile Internet,
robot, and artificial intelligence technology have enabled the interdisciplinary innovations …

AI-Skin: Skin disease recognition based on self-learning and wide data collection through a closed-loop framework

M Chen, P Zhou, D Wu, L Hu, MM Hassan, A Alamri - Information Fusion, 2020 - Elsevier
There are a lot of hidden dangers in the change of human skin conditions, such as the
sunburn caused by long-time exposure to ultraviolet radiation, which not only has aesthetic …

Artificial agent: The fusion of artificial intelligence and a mobile agent for energy-efficient traffic control in wireless sensor networks

J Lu, L Feng, J Yang, MM Hassan, A Alelaiwi… - Future generation …, 2019 - Elsevier
Applications of wireless sensor networks are blooming for attacking some limits of social
development, among which energy consumption and communication latency are fatal …

Recurrent convolutional neural network based multimodal disease risk prediction

Y Hao, M Usama, J Yang, MS Hossain… - Future Generation …, 2019 - Elsevier
With the rapid growth of biomedical and healthcare data, machine learning methods are
used in more and more work to predict disease risk. However, most works use single-mode …

DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments

K He, J Chen, R Du, Q Wu, G Xue… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to
check the integrity of outsourced files and to efficiently update the files in a cloud server …

Secure enforcement in cognitive internet of vehicles

Y Qian, M Chen, J Chen, MS Hossain… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
As for deployment of security strategy, corresponding forwarding rules for switches can be
given in allusion to different traffic conditions. However, due to lack of global cognitive …

Joint link adaption and resource allocation for satellite networks with network coding

R Wang, R Ma, G Liu, W Kang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Satellite network is a resource-limited system. How to fully explore the transmission capacity
of a satellite network by integrating advanced communication technologies is a hot research …