Reliable data collection techniques in underwater wireless sensor networks: A survey

X Wei, H Guo, X Wang, X Wang… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Reliable data collection techniques, whose aim is to ensure that sensed data are received
successfully by a sink, are essential for applications in Underwater Wireless Sensor …

Diagnosis of fault node in wireless sensor networks using adaptive neuro-fuzzy inference system

MS Rajan, G Dilip, N Kannan, M Namratha, S Majji… - Applied …, 2023 - Springer
Wireless networks (WSN) are sometimes inaccessible to humans and can be found in deep
forests, diverse risky fields, high-mountainous areas and even underwater environments at …

A novel spatial-temporal multi-scale alignment graph neural network security model for vehicles prediction

C Diao, D Zhang, W Liang, KC Li… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Traffic flow forecasting is indispensable in today's society and regarded as a key problem for
Intelligent Transportation Systems (ITS), as emergency delays in vehicles can cause serious …

Privacy-aware service placement for mobile edge computing via federated learning

Y Qian, L Hu, J Chen, X Guan, MM Hassan… - Information Sciences, 2019 - Elsevier
Mobile edge clouds can offer delay-sensitive services to users by deploying storage and
computing resources at the network edge. Considering resource-limited edge server, it is …

An intelligent fault detection approach based on reinforcement learning system in wireless sensor network

T Mahmood, J Li, Y Pei, F Akhtar, SA Butt… - The Journal of …, 2022 - Springer
Abstract The Internet of Things (IoT) has developed a well-defined infrastructure due to
commercializing novel technologies. IoT networks enable smart devices to compile …

Who moved my data? privacy protection in smartphones

W Dai, M Qiu, L Qiu, L Chen… - IEEE Communications …, 2017 - ieeexplore.ieee.org
While enjoying the convenience brought by various kinds of IoT devices, our private data are
leaked. Smartphones, as the typical pivot of IoT devices, use various kinds of apps, which …

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments

W Liang, S Xie, J Long, KC Li, D Zhang, K Li - Information Sciences, 2019 - Elsevier
The rapid development of sensing, automation and communication technologies has led to
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …

An incentive-based protection and recovery strategy for secure big data in social networks

Y Wu, H Huang, N Wu, Y Wang, MZA Bhuiyan… - Information Sciences, 2020 - Elsevier
Big data sources, such as smart vehicles, IoT devices, and sensor networks, differ from
traditional data sources in both output volume and variety. Big data is usually stored on …

A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance

K Gai, M Qiu, SA Elnagdy - … Conference on Big Data Security on …, 2016 - ieeexplore.ieee.org
The remarkable increasing demands of mitigating losses from cyber incidents for financial
firms has been driving the rapid development of the Cybersecurity Insurance (CI). The …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …