Orchestrating next-gen applications over heterogeneous resources along the Cloud-IoT continuum calls for new strategies and tools to enable scalable and application-specific …
The service-based architecture of the Fifth Generation (5G) had combined the services and security architectures and enhanced the authentication process of services to expand the …
MY Tsai, HH Cho - Mobile Networks and Applications, 2021 - Springer
Encryption technology has a great influence on data security. There are many encryptions have been proposed. In general, the encryptions with higher complexity will provide higher …
CY Chen, HH Cho, MY Tsai… - … Journal of Ad Hoc …, 2021 - inderscienceonline.com
The number of IoT devices will grow explosively due to great potential of the NB-IoT so that the IoT network environment will become a hotbed of botnets. Various IoT devices and …
HH Cho, MY Tsai, JY Zeng, CM Yu… - IEEE Systems …, 2023 - ieeexplore.ieee.org
After Industry 4.0 was proposed, cyber–physical systems (CPS) were also introduced into the industrial environment called the industrial CPS. Internet-of-Things (IoT) services in the …
JY Zeng, LE Chang, HH Cho, CY Chen… - … IEEE Conference on …, 2022 - ieeexplore.ieee.org
Because the hardware capabilities of narrowband IoT devices are not enough to carry powerful antivirus software or security mechanisms so that some scholars have used deep …
Z Lv, Z Xi - Complexity, 2021 - Wiley Online Library
Based on the millimetre‐wave time‐domain channel detector, this paper conducts channel measurement and modelling for different scenarios and antenna types in typical frequency …
MY Tsai, HH Cho - 2021 International Symposium on Intelligent …, 2021 - ieeexplore.ieee.org
Gated recurrent unit (GRU) neural network has been widely used in mobile communication traffic prediction. This is because that GRU can obtain acceptable prediction accuracy with …
In order to maintain data privacy and security for consumers, data encryption is closely related to our daily lives. Symmetric encryption is currently the most widely used encryption …