Y Ding, G Wu, D Chen, N Zhang, L Gong… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the medical information network to facilitate the process of diagnosing and treating doctors. As …
F Zhou, Q Yang, T Zhong, D Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As one of the most important applications of industrial Internet of Things, intelligent transportation system aims to improve the efficiency and safety of transportation networks. In …
D Chen, H Wang, N Zhang, X Nie… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
To ensure the security of Internet of Things (IoT) communications, one can use deep packet inspection (DPI) on network middleboxes to detect and mitigate anomalies and suspicious …
Y Ding, C Zhang, M Cao, Y Wang, D Chen, N Zhang… - Neurocomputing, 2021 - Elsevier
Brain tumor segmentation using MRI data remains challenging for some reasons. Hence, how to accurately segment the brain tumor is kept as a significant topic in the area of …
D Chen, L Zhang, Z Liao, HN Dai… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
It is of the utmost importance to achieve flexible and fine-grained access control of electronic health records (EHRs) in smart elderly healthcare (SEH) for providing high-quality …
D Chen, Z Zhao, X Qin, Y Luo, M Cao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …
Q Wang, X Chen, X Jin, X Li, D Chen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The integration of the space–air–ground-integrated network and the Internet of Vehicles (IoV) enables the IoV to achieve full network coverage and better network performance …
In this paper, a novel message authentication model using the same key over wiretap channel is proposed to achieve information-theoretic security. Specifically, in the proposed …
In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication …