A review on deep learning for future smart cities

S Bhattacharya, SRK Somayaji… - Internet Technology …, 2022 - Wiley Online Library
The advancements in Information and Communication Technologies (ICT) made the
concept of Smart Cities into reality. In a smart city several Internet of Things (IoT) sensors are …

The role of the internet of things in health care: a systematic and comprehensive study

NN Thilakarathne, MK Kagita… - Available at SSRN …, 2020 - papers.ssrn.com
Abstract The Internet of Things (IoT) is becoming an emerging trend and has significant
potential to replace other technologies, where researchers consider it as the future of the …

A metaheuristic optimization approach for energy efficiency in the IoT networks

C Iwendi, PKR Maddikunta… - Software: Practice …, 2021 - Wiley Online Library
Summary Recently Internet of Things (IoT) is being used in several fields like smart city,
agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has …

Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks

C Iwendi, Z Jalil, AR Javed, T Reddy, R Kaluri… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-
jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the …

Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything

SP RM, S Bhattacharya, PKR Maddikunta… - Journal of parallel and …, 2020 - Elsevier
The smart applications dominating the planet in the present day and age, have innovatively
progressed to deploy Internet of Things (IoT) based systems and related infrastructures in all …

Real-time facial emotion recognition system among children with autism based on deep learning and IoT

FM Talaat - Neural Computing and Applications, 2023 - Springer
Diagnosis of autism considers a challenging task for medical experts since the medical
diagnosis mainly depends on the abnormalities in the brain functions that may not appear in …

Design of anomaly-based intrusion detection system using fog computing for IoT network

P Kumar, GP Gupta, R Tripathi - Automatic Control and Computer …, 2021 - Springer
With increase in the demand for Internet of Things (IoT)-based services, the capability to
detect anomalies such as malicious control, spying and other threats within IoT-based …

LAP-IoHT: A lightweight authentication protocol for the internet of health things

CM Chen, Z Chen, S Kumari, MC Lin - Sensors, 2022 - mdpi.com
The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in
healthcare, has provided a new type of telemedicine approach. In IoHT, wearable sensors …

[PDF][PDF] PSAP-WSN: a provably secure authentication protocol for 5g-based wireless sensor networks

X Li, S Liu, S Kumari, CM Chen - CMES-Computer Modeling in …, 2023 - cdn.techscience.cn
Nowadays, the widespread application of 5G has promoted rapid development in different
areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of …

Realizing efficient security and privacy in IoT networks

JH Anajemba, Y Tang, C Iwendi, A Ohwoekevwo… - Sensors, 2020 - mdpi.com
In recent times, security and privacy at the physical (PHY) layer has been a major issue of
several communication technologies which comprise the internet of things (IoT) and mostly …