相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Internet of Things intrusion detection systems: a comprehensive review and future directions
Arash Heidari et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues
Arash Heidari et al.
ACM COMPUTING SURVEYS (2023)
Review and potential for artificial intelligence in healthcare
Lina Sun et al.
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2022)
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network
Aitizaz Ali et al.
SENSORS (2022)
Privacy-preserving statistical computing protocols for private set intersection
Ziyu Niu et al.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)
Traffic Flow Prediction: An Intelligent Scheme for Forecasting Traffic Flow Using Air Pollution Data in Smart Cities with Bagging Ensemble
Noor Ullah Khan et al.
SUSTAINABILITY (2022)
DIAGNOSTIC TEST ACCURACY OF FRAILTY SCREENING TOOLS USING DATA IN ELECTRONIC PRIMARY CARE RECORDS
S. Makin et al.
AGE AND AGEING (2022)
Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
Huawei Huang
SYMMETRY-BASEL (2022)
Efficient Sequential and Parallel Prime Sieve Algorithms
Hazem M. Bahig et al.
SYMMETRY-BASEL (2022)
Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal
Ohood Saud Althobaiti et al.
SYMMETRY-BASEL (2022)
Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem
Mohamed Gabr et al.
SYMMETRY-BASEL (2022)
Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology
Zahari Mahad et al.
SYMMETRY-BASEL (2022)
Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems
Hatem M. Bahig et al.
SYMMETRY-BASEL (2022)
An improved anti-quantum MST3 public key encryption scheme for remote sensing images
Xianmin Wang et al.
ENTERPRISE INFORMATION SYSTEMS (2021)
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
Jing Li et al.
MOBILE NETWORKS & APPLICATIONS (2021)
GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things
Jinao Yu et al.
SENSORS (2021)
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Wenbin Chen et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2021)
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system
Heng Ye et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Secure video retrieval using image query on an untrusted cloud
Hongyang Yan et al.
APPLIED SOFT COMPUTING (2020)
Blockchain-based public auditing and secure deduplication with fair arbitration
Haoran Yuan et al.
INFORMATION SCIENCES (2020)
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion et al.
2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020) (2020)
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement
Zhengjun Jing et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud
Youwen Zhu et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)
Differentially private Naive Bayes learning over multiple data sources
Tong Li et al.
INFORMATION SCIENCES (2018)
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
Run Xie et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Securely Outsourcing ID3 Decision Tree in Cloud Computing
Ye Li et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions
Zhaoquan Cai et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)