Design of cognitive fog computing for intrusion detection in Internet of Things

S Prabavathy, K Sundarakantham… - Journal of …, 2018 - ieeexplore.ieee.org
Internet of things (IoT) is penetrating into every aspect of our lives including our body, our
home and our living environment along with numerous security challenges. With rapidly …

Incentive mechanism for computation offloading using edge computing: A Stackelberg game approach

Y Liu, C Xu, Y Zhan, Z Liu, J Guan, H Zhang - Computer Networks, 2017 - Elsevier
IoT-based services benefit from cloud which offers a virtually unlimited capabilities, such as
storage, processing, and communication. However, the challenges are still open for mobile …

SocInf: Membership inference attacks on social media health data with machine learning

G Liu, C Wang, K Peng, H Huang, Y Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Social media networks have shown rapid growth in the past, and massive social data are
generated which can reveal behavior or emotion propensities of users. Numerous social …

Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks

H Zhou, VCM Leung, C Zhu, S Xu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we predict nodes' social contact patterns from the temporal perspective, and
propose a novel approach to improve the performance of data forwarding in opportunistic …

[PDF][PDF] Three dimensional optimum node localization in dynamic wireless sensor networks

GS Walia, P Singh, M Singh… - … , Materials & Continua, 2022 - academia.edu
Location information plays an important role in most of the applications in Wireless Sensor
Network (WSN). Recently, many localization techniques have been proposed, while most of …

Efficient QoS support for robust resource allocation in blockchain-based femtocell networks

Z Liu, L Gao, Y Liu, X Guan, K Ma… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Blockchain-based femtocell networks aim to build decentralized frameworks which enable
easy deployment and low power consumption, thus they have been seen promising …

Optimal online data dissemination for resource constrained mobile opportunistic networks

Y Liu, H Wu, Y Xia, Y Wang, F Li… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Delivery delay and communication costs are two conflicting design issues for mobile
opportunistic networks with nonreplenishable energy resources. In this paper, we study the …

SEBAR: Social-energy-based routing for mobile social delay-tolerant networks

F Li, H Jiang, H Li, Y Cheng… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Delay-tolerant networks (DTNs) are intermittently connected networks, such as mobile social
networks formed by human-carried mobile devices. Routing in such mobile social DTNs is …

An algorithmic approach for core election in mobile ad-hoc network

F Khan, AW Khan, K Shah, I Qasim… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
Multicasting has an important contribution in a wireless sensor network. Through
multicasting, multiple copies of data at the same time in a single transmission can be …

D2D-based vehicular communication with delayed CSI feedback

Z Liu, X Han, Y Liu, Y Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communications can combine the superiorities of both the cellular
network and the Ad hoc network, and it is an efficient way to improve the capacity of short …