相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Interaction Relational Network for Mutual Action Recognition
Mauricio Perez et al.
IEEE TRANSACTIONS ON MULTIMEDIA (2022)
Privacy-Preserving Deep Action Recognition: An Adversarial Learning Framework and A New Dataset
Zhenyu Wu et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2022)
FUSION-Fog Computing and Blockchain for Trusted Industrial Internet of Things
Andrea Ceccarelli et al.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)
A Cloud-Based Computing Framework for Artificial Intelligence Innovation in Support of Multidomain Operations
James Robertson et al.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)
Designing a Health Coach-Augmented mHealth System for the Secondary Prevention of Coronary Heart Disease Among Women
Avijit Sengupta et al.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2022)
Secure human action recognition by encrypted neural network inference
Miran Kim et al.
NATURE COMMUNICATIONS (2022)
A federated learning system with enhanced feature extraction for human activity recognition
Zhiwen Xiao et al.
KNOWLEDGE-BASED SYSTEMS (2021)
A Survey on Object Detection for the Internet of Multimedia Things (IoMT) using Deep Learning and Event-based Middleware: Approaches, Challenges, and Future Directions
Asra Aslam et al.
IMAGE AND VISION COMPUTING (2021)
Mutual authentication with multi-factor in IoT-Fog-Cloud environment
Leandro Loffi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)
G2F: A Secure User Authentication for Rapid Smart Home IoT Management
Hongwei Luo et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Fog computing security and privacy for the Internet of Thing applications: State-of-the-art
Yehia I. Alzoubi et al.
SECURITY AND PRIVACY (2021)
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment
Hojin Choi et al.
IEEE ACCESS (2021)
ANN Assisted-IoT Enabled COVID-19 Patient Monitoring
Geetanjali Rathee et al.
IEEE ACCESS (2021)
Privacy and Security Issues in Deep Learning: A Survey
Ximeng Liu et al.
IEEE ACCESS (2021)
OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields
Zhe Cao et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2021)
Skeleton-based action recognition by part-aware graph convolutional networks
Yang Qin et al.
VISUAL COMPUTER (2020)
Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN
Amitesh Singh Rajput et al.
EXPERT SYSTEMS WITH APPLICATIONS (2020)
Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions
Omar Abu Arqub et al.
SOFT COMPUTING (2020)
A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems
Lalit Chettri et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues
Babatuni Omoniwa et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
An Edge-Fog-Cloud Architecture of Streaming Analytics for Internet of Things Applications
Hung Cao et al.
SENSORS (2019)
Comparative Study of Various Cryptographic Algorithms Used for Text, Image, and Video
Nilesh Advani et al.
EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY (2019)
Spatial Residual Layer and Dense Connection Block Enhanced Spatial Temporal Graph Convolutional Network for Skeleton-Based Action Recognition
Cong Wu et al.
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW) (2019)
Intelligent video surveillance: a review through deep learning techniques for crowd analysis
G. Sreenu et al.
JOURNAL OF BIG DATA (2019)
Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey
Yingnan Sun et al.
IEEE ACCESS (2019)
The Ubiquitous Healthcare Facility Framework: A Proposed System for Managing Rural Antenatal Care
Maria Saleemi et al.
IEEE ACCESS (2019)
Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
Michele De Donno et al.
IEEE ACCESS (2019)
Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications
Alka Leekha et al.
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2019)
Future Edge Cloud and Edge Computing for Internet of Things Applications
Jianli Pan et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Robust Spatio-Temporal Features for Human Interaction Recognition via Artificial Neural Network
Ahmad Jalal et al.
2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018) (2018)
Human Activity Recognition for Healthcare using Smartphones
Godwin Ogbuabor et al.
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018) (2018)
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
Saurabh Singh et al.
Journal of Ambient Intelligence and Humanized Computing (2017)
Towards Accurate Multi-person Pose Estimation in the Wild
George Papandreou et al.
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)
Fog computing security: a review of current applications and security solutions
Saad Khan et al.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)
Quantitative analysis of the security performance in wireless LANs
Poonam Jindal et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2017)
Two-person interaction recognition via spatial multiple instance embedding
Fadime Sener et al.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)
Analysis of SHA-512/224 and SHA-512/256
Christoph Dobraunig et al.
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II (2015)
Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm
Omar Abu Arqub et al.
INFORMATION SCIENCES (2014)
Human interaction recognition based on the co-occurence of visual words
K. Nour el Houda Slimani et al.
2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2014)