Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT

J Ren, J Li, H Liu, T Qin - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
With the rapid advancement of the Internet of Things (IoT), the typical application of wireless
body area networks (WBANs) based smart healthcare has drawn wide attention from all …

[HTML][HTML] A systematic literature Review: Risk analysis in cloud migration

B Soewito, FL Gaol, E Abdurachman - Journal of King Saud University …, 2022 - Elsevier
The era of the industrial revolution 4.0 was an era marked by the transition of information
and communication technology that was able to create new technology-based investments …

A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

EVchain: An anonymous blockchain-based system for charging-connected electric vehicles

S Xu, X Chen, Y He - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
Purchases of electric vehicles have been increasing in recent years. These vehicles differ
from traditional fossil-fuel-based vehicles especially in the time consumed to keep them …

Dataflow management in the internet of things: Sensing, control, and security

D Wei, H Ning, F Shi, Y Wan, J Xu… - Tsinghua Science …, 2021 - ieeexplore.ieee.org
The pervasiveness of the smart Internet of Things (IoTs) enables many electric sensors and
devices to be connected and generates a large amount of dataflow. Compared with …

[HTML][HTML] Adaptive multi-channel Bayesian graph attention network for IoT transaction security

Z Liu, D Yang, S Wang, H Su - Digital Communications and Networks, 2022 - Elsevier
With the rapid advancement of 5G technology, the Internet of Things (IoT) has entered a new
phase of application and is rapidly becoming a significant force in promoting economic …

Stimulating trust cooperation in edge services: An evolutionary tripartite game

P Sun, S Shen, Z Wu, H Zhou, XZ Gao - Engineering Applications of …, 2022 - Elsevier
Network edge services have contributed to ordinary people's daily lives with numerous
conveniences but the accompanying problems, such as counterfeiting, the trust crisis and …

HTDet: A clustering method using information entropy for hardware Trojan detection

R Lu, H Shen, Z Feng, H Li, W Zhao… - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
Hardware Trojans (HTs) have drawn increasing attention in both academia and industry
because of their significant potential threat. In this paper, we propose HTDet, a novel HT …

Big data and cloud computing: A critical review

A Gautam, I Chatterjee - International Journal of Operations …, 2020 - igi-global.com
With evolving technology, a huge data is being generated from everywhere in various forms.
The driving factors for the evolution of data, such as retail, media, banking, healthcare, and …

Maximizing Overall Service Profit: Multi-Edge Service Pricing as a Stochastic Game Model

S Pang, X Zhao, J Luo, J Chen… - Tsinghua Science and …, 2024 - ieeexplore.ieee.org
The diversified development of the service ecosystem, particularly the rapid growth of
services like cloud and edge computing, has propelled the flourishing expansion of the …