Related references
Note: Only part of the references are listed.A Tensor-Based Multiattributes Visual Feature Recognition Method for Industrial Intelligence
Xiaokang Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
ADTT: A Highly Efficient Distributed Tensor-Train Decomposition Method for IIoT Big Data
Xiaokang Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems
Zhiwei Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT
Faezeh Farivar et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement
Mauro Gaggero et al.
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2019)
A computation offloading method over big data for IoT-enabled cloud-edge computing
Xiaolong Xu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Lightweight Convolution Neural Networks for Mobile Edge Computing in Transportation Cyber Physical Systems
Junhao Zhou et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)
A Trust Computing-based Security Routing Scheme for Cyber Physical Systems
Yuxin Liu et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)
Attack Detection for Securing Cyber Physical Systems
Weizhong Yan et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems
Marilyn Wolf et al.
PROCEEDINGS OF THE IEEE (2018)
An IoT-Oriented data placement method with privacy preservation in cloud environment
Xiaolong Xu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Multi-key privacy-preserving deep learning in cloud computing
Ping Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems
Xu Jin et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2017)
Security and privacy challenges in mobile cloud computing: Survey and way ahead
Muhammad Baqer Mollah et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Cyber-Physical Systems Security-A Survey
Abdulmalik Humayed et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
Zhihua Xia et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment
Xiaolong Xu et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2016)
Optimizing data placement in heterogeneous Hadoop clusters
Runqun Xiong et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2015)
An Energy-aware Task Scheduling Algorithm for a Heterogeneous Data Center
Shuo Zhang et al.
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) (2013)