4.5 Article

Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Secure Artificial Intelligence of Things for Implicit Group Recommendations

Keping Yu et al.

Summary: The emergence of Artificial Intelligence of Things (AIoT) has provided new opportunities for social computing applications. This article proposes a secure AIoT architecture for implicit group recommendations, which effectively captures group preference features and provides personalized services through hardware and software modules.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things

Hang Li et al.

Summary: The Internet of Health Things (IoHT) refers to uniquely identifiable devices connected to the Internet that can communicate with each other. This concept plays a crucial role in smart health monitoring and improvement systems, with cybersecurity being a top priority. This article proposes a novel access policy expression method and constructs a flexible and efficient encryption scheme to ensure data security in the IoHT.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)

Article Computer Science, Hardware & Architecture

A blockchain-empowered crowdsourcing system for 5G-enabled smart cities *

Liang Tan et al.

Summary: With the advancement of 5G technology, smart city services have become essential for modern city development. However, existing crowdsourcing systems pose security risks due to reliance on centralized payment institutions. To address this issue, a blockchain-empowered and decentralized trusted service mechanism has been proposed for 5G-enabled smart cities, showing effectiveness in experiments.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Information Systems

Energy-Efficient Random Access for LEO Satellite-Assisted 6G Internet of Remote Things

Li Zhen et al.

Summary: Satellite communication system is crucial for IoT applications in the future. The main challenge lies in accommodating massive RA requests while minimizing energy consumption. The article focuses on reliable RA preamble design and detection to enhance access efficiency in high-dynamic LEO scenarios through the use of a long preamble sequence constructed from a single root ZC sequence.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach

Chaosheng Feng et al.

Summary: This study proposes a secure data sharing model for flying drones in 5G environment, utilizing blockchain and ABE technology for authentication and data security. The model incorporates smart contracts, public key cryptography, and distributed ledger for authentication and security audit. Furthermore, the ABEM-POC model and parallel computation method significantly improve the speed of outsourced encryption and decryption.

IEEE NETWORK (2021)

Article Computer Science, Information Systems

3D Reconstruction for Motion Blurred Images Using Deep Learning-Based Intelligent Systems

Jing Zhang et al.

Summary: Utilizing deep learning for 3D reconstruction allows for accurate measurement of an individual's height and shape. The BF-WGAN algorithm was proposed to remove motion blur, while the TO-RANSAC algorithm significantly improves 3D reconstruction accuracy.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network

Ying Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)