Internet of Things (IoT) security with blockchain technology: A state-of-the-art review

AA Khan, AA Laghari, ZA Shaikh… - IEEE …, 2022 - ieeexplore.ieee.org
With the rapid enhancement in the design and development of the Internet of Things creates
a new research interest in the adaptation in industrial domains. It is due to the impact of …

Dynamic auxiliary task-based evolutionary multitasking for constrained multi-objective optimization

K Qiao, K Yu, B Qu, J Liang, H Song… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
When solving constrained multi-objective optimization problems (CMOPs), the utilization of
infeasible solutions significantly affects algorithm's performance because they not only …

Automatic design of machine learning via evolutionary computation: A survey

N Li, L Ma, T Xing, G Yu, C Wang, Y Wen, S Cheng… - Applied Soft …, 2023 - Elsevier
Abstract Machine learning (ML), as the most promising paradigm to discover deep
knowledge from data, has been widely applied to practical applications, such as …

Reverse auction-based computation offloading and resource allocation in mobile cloud-edge computing

H Zhou, T Wu, X Chen, S He, D Guo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper proposes a novel Reverse Auction-based Computation Offloading and Resource
Allocation Mechanism, named RACORAM for the mobile Cloud-Edge computing. The basic …

Spherical search algorithm with adaptive population control for global continuous optimization problems

K Wang, Y Wang, S Tao, Z Cai, Z Lei, S Gao - Applied Soft Computing, 2023 - Elsevier
Spherical search algorithm (SSA) calculates the spherical boundary and generates new
solutions on it by two sub-populations jointly. Many researches have shown that SSA is a …

[HTML][HTML] XAI framework for cardiovascular disease prediction using classification techniques

P Guleria, P Naga Srinivasu, S Ahmed, N Almusallam… - Electronics, 2022 - mdpi.com
Machine intelligence models are robust in classifying the datasets for data analytics and for
predicting the insights that would assist in making clinical decisions. The models would …

Multiple Attention Mechanism Graph Convolution HAR Model Based on Coordination Theory

K Hu, Y Ding, J Jin, M Xia, H Huang - Sensors, 2022 - mdpi.com
Human action recognition (HAR) is the foundation of human behavior comprehension. It is of
great significance and can be used in many real-world applications. From the point of view …

[HTML][HTML] Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud

MB Qureshi, MS Qureshi, S Tahir, A Anwar, S Hussain… - Symmetry, 2022 - mdpi.com
With technological advancement, cloud computing paradigms are gaining massive
popularity in the ever-changing technological advancement. The main objective of the cloud …

[HTML][HTML] A method of intrusion detection based on woa-xgboost algorithm

Y Song, H Li, P Xu, D Liu - Discrete Dynamics in Nature and Society, 2022 - hindawi.com
With the development of information technology, computer networks have become a part of
people's lives and work. However, computer viruses and malicious network attacks make …

Decomposition-based multi-objective evolutionary algorithm for virtual machine and task joint scheduling of cloud computing in data space

X Wang, H Lou, Z Dong, C Yu, R Lu - Swarm and Evolutionary …, 2023 - Elsevier
Abstract Efficient Virtual Machine (VM) placement and task scheduling is considered a major
challenge in cloud computing, given that the scheduling results directly affect user …