Accuracy analyses and model comparison of machine learning adopted in building energy consumption prediction

Z Liu, D Wu, Y Liu, Z Han, L Lun… - Energy Exploration …, 2019 - journals.sagepub.com
It is of great significance to achieve the prediction of building energy consumption. However,
machine learning, as a promising technique for many practical applications, was rarely …

Efficient data access control with fine-grained data protection in cloud-assisted IIoT

S Qi, Y Lu, W Wei, X Chen - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build
digitalized industrial systems. A fundamental technology of IIoT is the radio-frequency …

Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain

S Qi, Y Lu, Y Zheng, Y Li, X Chen - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a promising technology to provide product traceability for industrial
systems. By using sensing and networking techniques, an IoT-enabled industrial system …

Multi-level word features based on CNN for fake news detection in cultural communication

Q Li, Q Hu, Y Lu, Y Yang, J Cheng - Personal and Ubiquitous Computing, 2020 - Springer
In recent years, due to the booming development of online social networks, fake news has
been appearing in large numbers and widespread in the online world. With deceptive …

Algorithm research of known-plaintext attack on double random phase mask based on WSNs

W Wei, M Woźniak, R Damaševičius… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
With the development and popularization of computer and Internet, information
communication plays an irreplaceable role in the modern society. Security problems of the …

A framework for software diversification with {ISA} heterogeneity

X Wang, SM Yeoh, R Lyerly, P Olivier, SH Kim… - … on Research in Attacks …, 2020 - usenix.org
Software diversification is one of the most effective ways to defeat memory corruption based
attacks. Traditional software diversification such as code randomization techniques …

Secure deduplication-based storage systems with resistance to side-channel attacks via fog computing

Y Lu, Y Qi, S Qi, F Zhang, W Wei, X Yang… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Data deduplication technique could greatly save the storage overhead of the cloud by
eliminating duplicated data and retaining one copy. In order to ensure the privacy of the data …

Crypt-DAC: Cryptographically enforced dynamic access control in the cloud

S Qi, Y Zheng - IEEE Transactions on Dependable and Secure …, 2019 - ieeexplore.ieee.org
Enabling cryptographically enforced access controls for data hosted in untrusted cloud is
attractive for many users and organizations. However, designing efficient cryptographically …

Research on DV-Hop improved algorithm based on dual communication radius

T Li, C Wang, Q Na - EURASIP Journal on Wireless Communications and …, 2020 - Springer
In order to solve the problem that the traditional DV-Hop location algorithm has a large error
in locating unknown nodes, this paper proposes an improved DV-Hop algorithm based on …

Adaptive management and multi-objective optimization of virtual machine in cloud computing based on particle swarm optimization

S Li, X Pan - EURASIP Journal on Wireless Communications and …, 2020 - Springer
In order to improve the adaptive management ability of virtual machine placement in cloud
computing, an adaptive management and multi-objective optimization method for virtual …