Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey

AR Javed, MA Hassan, F Shahzad, W Ahmed, S Singh… - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) revitalizes the world with tremendous capabilities and potential
to be utilized in vehicular networks. The Smart Transport Infrastructure (STI) era depends …

Novel graph-based machine learning technique to secure smart vehicles in intelligent transportation systems

BB Gupta, A Gaurav, EC Marín… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) is a developing technology that will significantly alter the
driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) …

Swapadvisor: Pushing deep learning beyond the gpu memory limit via smart swapping

CC Huang, G Jin, J Li - Proceedings of the Twenty-Fifth International …, 2020 - dl.acm.org
It is known that deeper and wider neural networks can achieve better accuracy. But it is
difficult to continue the trend to increase model size due to limited GPU memory. One …

Secure routing strategy based on attribute-based trust access control in social-aware networks

X Zhang, H Deng, Z Xiong, Y Liu, Y Rao, Y Lyu… - Journal of Signal …, 2024 - Springer
In social aware networks, the routing protocol possesses a considerable amount of sensitive
user information during node transmission. When selecting the next hop node for …

A fine-grained access control and security approach for intelligent vehicular transport in 6G communication system

Z Zhou, A Gaurav, BB Gupta… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
The area of intelligent transport systems (ITS) is attracting growing attention because of the
integration of the smart IoT with vehicles that improve user safety and overall travel …

Privacy-aware service placement for mobile edge computing via federated learning

Y Qian, L Hu, J Chen, X Guan, MM Hassan… - Information Sciences, 2019 - Elsevier
Mobile edge clouds can offer delay-sensitive services to users by deploying storage and
computing resources at the network edge. Considering resource-limited edge server, it is …

An incentive-based protection and recovery strategy for secure big data in social networks

Y Wu, H Huang, N Wu, Y Wang, MZA Bhuiyan… - Information Sciences, 2020 - Elsevier
Big data sources, such as smart vehicles, IoT devices, and sensor networks, differ from
traditional data sources in both output volume and variety. Big data is usually stored on …

Integrating aspect analysis and local outlier factor for intelligent review spam detection

L You, Q Peng, Z Xiong, D He, M Qiu… - Future Generation …, 2020 - Elsevier
Recently, online reviews are used increasingly by individuals and organizations for making
purchase and business decisions. Unfortunately, driven by profit and fame, spammers post …

Energy optimization with dynamic task scheduling mobile cloud computing

Y Li, M Chen, W Dai, M Qiu - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
The smartphone is a typical cyberphysical system (CPS). It must be low energy consuming
and highly reliable to deal with the simple but frequent interactions with the cloud, which …

Electronic health record error prevention approach using ontology in big data

K Gai, M Qiu, LC Chen, M Liu - 2015 IEEE 17th International …, 2015 - ieeexplore.ieee.org
Electronic Health Record (EHR) systems have been playing a dramatically important role in
tele-health domains. One of the major benefits of using EHR systems is assisting physicians …