Related references
Note: Only part of the references are listed.AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT
B. D. Deebak et al.
AD HOC NETWORKS (2022)
Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm
B. Balashunmugaraja et al.
KNOWLEDGE-BASED SYSTEMS (2022)
Mitigation of black hole attacks using firefly and artificial neural network
Pooja Rani et al.
NEURAL COMPUTING & APPLICATIONS (2022)
Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks
Tan Le et al.
AD HOC NETWORKS (2022)
ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC
Mohit Kumar et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks
Mohit Kumar et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)
An efficient framework using visual recognition for IoT based smart city surveillance
Manish Kumar et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2021)
Toward Secure Data Fusion in Industrial IoT Using Transfer Learning
Hui Lin et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain
Xiaoding Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
Irin G. Loretta et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)
Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks
Yulei Wu et al.
COMPUTER NETWORKS (2021)
Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things
Leyou Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0
Jayasree Sengupta et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Challenges and Opportunities in Securing the Industrial Internet of Things
Martin Serror et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications
Nasr Abosata et al.
SENSORS (2021)
PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities
Prabhat Kumar et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT
Xiaoyu Zhang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things
Tian Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
Pathum Chamikara Mahawaga Arachchige et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion
Aris S. Lalos et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Matrix-Based Dynamic Authentication With Conditional Privacy-Preservation for Vehicular Network Security
Hayotjon Aliev et al.
IEEE ACCESS (2020)
Interoperability and Data Storage in Internet of Multimedia Things: Investigating Current Trends, Research Challenges and Future Directions
Guojie Yang et al.
IEEE ACCESS (2020)
Location Privacy Preservation Mechanism for Location-Based Service With Incomplete Location Data
Xudong Yang et al.
IEEE ACCESS (2020)
Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things
Mamoona Humayun et al.
IEEE ACCESS (2020)
A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
Alireza Esfahani et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
S. Thanga Revathi et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
A privacy-preserving code-based authentication protocol for Internet of Things
Noureddine Chikouche et al.
JOURNAL OF SUPERCOMPUTING (2019)
Data Provenance for IoT With Light Weight Authentication and Privacy Preservation
Muhammad Naveed Aman et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
A Provable Semi-Outsourcing Privacy Preserving Scheme for Data Transmission From IoT Devices
Xiaoshuai Zhang et al.
IEEE ACCESS (2019)
An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
B. D. Deebak et al.
IEEE ACCESS (2019)
The industrial internet of things (IIoT): An analysis framework
Hugh Boyes et al.
COMPUTERS IN INDUSTRY (2018)
Deploying Fog Computing in Industrial Internet of Things and Industry 4.0
Mohammad Aazam et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
An IoT-Oriented data placement method with privacy preservation in cloud environment
Xiaolong Xu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector
M. M. Annie Alphonsa et al.
EVOLUTIONARY INTELLIGENCE (2018)
A self-adaptive multi-population based Jaya algorithm for engineering optimization
R. Venkata Rao et al.
SWARM AND EVOLUTIONARY COMPUTATION (2017)
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
Pengfei Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Grasshopper Optimisation Algorithm: Theory and application
Shahrzad Saremi et al.
ADVANCES IN ENGINEERING SOFTWARE (2017)
Grey Wolf Optimizer
Seyedali Mirjalili et al.
ADVANCES IN ENGINEERING SOFTWARE (2014)
Internet of Things in Industries: A Survey
Li Da Xu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service
Chengzhe Lai et al.
IEEE INTERNET OF THINGS JOURNAL (2014)
Black hole: A new heuristic optimization approach for data clustering
Abdolreza Hatamlou
INFORMATION SCIENCES (2013)