相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Hardware & Architecture
Mohammad Reza Nosouhi et al.
Summary: In this article, a secure mix-based approach called UCoin is proposed to address the issues in preserving privacy of users in cryptocurrencies. It breaks the link between input and output addresses in transactions, utilizes a secure shuffling protocol, and achieves higher performance and compatibility with the existing cryptocurrency architecture.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Automation & Control Systems
Jian Guo et al.
Summary: This article proposes an impedance-based approach for stability analysis of droop inverters in an islanded microgrid with unbalanced loads. The harmonic transfer function (HTF) based alpha beta-impedance modeling methods are used to simplify impedance measurement and stability analysis, while preserving the coupling and multiple-frequency characteristics. Experimental results validate the accuracy of the proposed SISO impedance models, which accurately reveal low-frequency oscillations in the islanded microgrid.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
(2023)
Article
Mathematics, Applied
Q. Sun et al.
Summary: We introduce an extended SEIR infectious disease model with data assimilation to study the spread of COVID-19, taking into account undetected asymptomatic and pre-symptomatic cases. An ensemble Kalman filter is implemented to assimilate reliable observations and estimate the effective reproduction number and unobservable subpopulations. The analysis is conducted for three main prefectures of Japan and the entire country, revealing more stable estimated reproduction numbers compared to a different method. Sensitivity tests also suggest the decreasing efficiency of states of emergency.
JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS
(2023)
Article
Computer Science, Artificial Intelligence
Sheng Feng et al.
Summary: This article proposes a deep learning model for classifying high-dimensional data and aims to achieve optimal evaluation accuracy and robustness using multicriteria decision-making. A novel one-dimensional visual geometry group network (1D_VGGNet) is introduced to overcome the complexity and instability of high-dimensional data. Additionally, a one-dimensional convolutional neural network (1D_CNN) is used to effectively handle one-dimensional multicriteria decision-making.
APPLIED SOFT COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Guowen Wu et al.
Summary: Social Internet of Things (SIoT) is a fusion of Internet of Things and social networks, which has attracted attention as a target for hackers to spread viruses and breach data confidentiality. To address these problems, a novel virus spread model (STSIR) based on epidemic theory and game theory is proposed, which considers people behavior and the characteristics of SIoTs. The model STSIR introduces an individual-group game to establish the attack and defense model between infected and susceptible SIoT nodes, and differential equations to represent the model. Simulation results show that the model STSIR is more effective in curbing virus spread compared to traditional SIS and SIR models.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Computer Science, Theory & Methods
Guowen Wu et al.
Summary: To meet the computing requirements of industrial production, EIIoT that combines mobile edge computing with IIoT has emerged. An optimization model based on queuing theory is proposed to solve the task offloading problem in EIIoT. The improved MAQDRL algorithm achieves optimal offloading strategy in dynamic and random multiuser offloading environments.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2023)
Article
Computer Science, Information Systems
Chao Wang et al.
Summary: This article proposes a blockchain-enabled resource orchestration scheme for IoT using deep reinforcement learning. The scheme allows the IoT edge server and end user to reach a consensus on network resource allocation based on blockchain theory. By utilizing a policy network, the intelligent agent can perceive changes in the network's state and make dynamic resource allocation decisions. Simulation results demonstrate that the proposed scheme performs better than other security resource allocation algorithms, with average revenue, user request acceptance rate, and profitability increased by 8.5%, 1.8%, and 11.9%, respectively.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Interdisciplinary Applications
Asier Atutxa et al.
Summary: The use of advanced communications and smart mechanisms in industry is rapidly increasing, making cybersecurity a crucial aspect. Most industrial communication protocols rely on TLS for secure communication, but for UDP-based communications used in IIoT scenarios, DTLS is used due to its mechanisms to handle unreliable transport layers. However, the heavy (D)TLS handshake process sacrifices security for performance, particularly in resource-limited IIoT devices. This paper presents a solution that offloads server certificate validation to a resource-rich network element, improving security and performance by reducing DTLS handshake times and CPU usage in IIoT devices.
COMPUTERS IN INDUSTRY
(2023)
Article
Computer Science, Artificial Intelligence
Shigen Shen et al.
Summary: This study proposes a signaling game approach for privacy preservation in edge-computing-based IoT networks. It addresses the issue of malicious IoT nodes requesting private data from an IoT cloud storage system across edge nodes. The optimal privacy preservation strategies for edge nodes are derived and a signaling Q-learning algorithm is designed to achieve convergent equilibrium and game parameters. Simulation results show that the proposed algorithm effectively decreases the optimal probability of malicious requests, enhancing privacy preservation in edge-computing-based IoT cloud storage systems.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Youxiang Duan et al.
Summary: This paper proposes an SFC path optimization strategy based on the clustering of network functional layouts. By designing a topological network identification algorithm and a multi-headed attention mechanism, different types of SFC layouts can be optimized in a targeted manner. The experimental results demonstrate the effectiveness of this strategy in optimizing SFC paths and its ability to optimize service function chain paths in future complex network situations.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Guowen Wu et al.
Summary: In the scenario of Industry 4.0, mobile smart devices face challenges in processing massive amounts of data. To address this issue, a software-defined network-based mobile edge computing system is proposed to offload computation tasks to edge servers, reducing processing latency and energy consumption. A stochastic game-based computation offloading model is established, demonstrating the achievement of Nash Equilibrium. The proposed stochastic game-based resource allocation algorithm with prioritized experience replays (SGRA-PERs) outperforms other algorithms in reducing processing delay and energy consumption, even in large-scale MEC systems.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Telecommunications
Hongcheng Huang et al.
Summary: Nowadays, intelligent devices in the Industrial Internet of Things (IIoT) face unprecedented cybersecurity challenges. Due to limited security budget, IIoT devices are vulnerable to Distributed Denial-of-Service (DDoS) attacks, leading to disastrous consequences. Traditional defense solutions for networks cannot be directly applied to IIoT, requiring a multi-point collaborative defense mechanism. This mechanism includes an edge-centric mechanism called EdgeDefense for detecting and mitigating DDoS attacks, as well as a blockchain-based collaborative defense model for securely sharing defense information across the network.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Theory & Methods
Abhishek Hazra et al.
Summary: This review investigates the interoperability issues faced by Industrial IoT (IIoT) and discusses the advancements in technologies, solutions, and standards. Challenges and directions for future research are also highlighted.
ACM COMPUTING SURVEYS
(2023)
Article
Automation & Control Systems
Zihao Cheng et al.
Summary: Resilient distributed coordination control is studied on multiarea power systems with low inertia under hybrid attacks, including denial-of-service (DoS) attack and deception attack. The proposed resilient distributed scheme combines load-frequency control (LFC) with virtual inertia control (VIC), and uses a linear matrix inequality (LMI) technique to design the distributed resilient control gains. The validity of the theory is verified through simulation of a four-area power system.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2022)
Review
Computer Science, Interdisciplinary Applications
Angelo Corallo et al.
Summary: Cybersecurity awareness is crucial in the context of the Industrial Internet of Things (IIoT) to protect companies from cyber-attacks and data breaches. This study conducts a systematic literature review to analyze the existing state of the art in cybersecurity awareness, including definitions, industrial contexts, techniques, and benefits. The findings can be valuable for practitioners and researchers in future research and applications.
COMPUTERS IN INDUSTRY
(2022)
Article
Automation & Control Systems
Lei Cui et al.
Summary: This article presents a decentralized and asynchronous IoT anomaly detection framework based on blockchain and federated learning. The framework ensures data integrity and prevents single-point failure while improving efficiency. Additionally, an improved differentially private federated learning method based on generative adversarial networks is proposed to optimize data utility. Simulation results demonstrate superior performance in terms of robustness, accuracy, and fast convergence, while maintaining a high level of privacy and security protection.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Automation & Control Systems
Alexander Aurell et al.
Summary: Motivated by epidemic control models, this paper studies a Stackelberg mean field game model between a principal and a mean field of agents. The game is analyzed using a probabilistic approach and applied to an SIR-type epidemic model. An innovative numerical method is proposed to compute the solutions.
SIAM JOURNAL ON CONTROL AND OPTIMIZATION
(2022)
Article
Computer Science, Information Systems
Yizhou Shen et al.
Summary: This study addresses the issue of IoT malware dissemination in edge computing-assisted IoT systems. It predicts the optimal dissemination strategy and develops an algorithm to assess IoT availability. The research provides insights into the impact of system features on malware dissemination and availability assessment.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Article
Mathematics, Applied
Zhenfeng Shi et al.
Summary: This paper proposes a stochastic SEIRS rabies epidemic model with two patches to investigate the spatial spread of rabies under the influence of environmental noise. By adopting a new technique to construct stochastic Lyapunov functions, sufficient conditions for the existence of an ergodic stationary distribution are obtained. Moreover, the exact expression of probability density function around a quasi-equilibrium point is derived when the movement of dogs is forbidden.
APPLIED MATHEMATICS AND COMPUTATION
(2022)
Article
Computer Science, Information Systems
Zequn Niu et al.
Summary: This paper proposes an approach based on adaptive online analysis to accurately determine the families of malware in Industrial Internet of Things (IIoT) by analyzing encrypted, drift, and imbalanced traffic streams. The experiments show that the proposed method achieves a high classification accuracy.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Peiying Zhang et al.
Summary: Space-air-ground integration is a key trend in the 6G era, and efficient scheduling of multi-dimension network resources is a major challenge. By employing reinforcement learning and a bandwidth-aware virtual network resource allocation algorithm, the proposed approach outperforms conventional algorithms in terms of long-term average reward, acceptance rate, and long-term reward/cost.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Automation & Control Systems
Panjun Sun et al.
Summary: This paper constructs a new tripartite game model to enhance trust and cooperation among service participants. By calculating the ideal stable state point, it addresses the trust issues in network edge services, and designs relevant experimental studies to verify and compare the correctness and effectiveness of several factors that affect the convergence stability of the evolutionary games.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
(2022)
Article
Computer Science, Theory & Methods
Peiying Zhang et al.
Summary: This paper proposes a virtual network embedding (VNE) algorithm assisted by resource knowledge description (RKD) and deep reinforcement learning (DRL) to address the requirements of efficient network resource utilization and security in industrial Internet of Things (IIoT) applications. By using social attribute perception to measure the security of physical nodes, standardizing resource constraints with RKD, and using a DRL agent to derive the probability of physical node embedding, the algorithm shows significant advantages in VNE, as demonstrated by simulation experiments.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Information Systems
Muhammad Naveed Aman et al.
Summary: This article presents a secure patching framework for IoT, using remote attestation and physical unclonable functions (PUFs) to control and mitigate malware propagation.
IEEE SYSTEMS JOURNAL
(2022)
Article
Engineering, Multidisciplinary
Ashish R. Hota et al.
Summary: Motivated by the COVID-19 pandemic, a closed-loop framework is proposed to control the spread of the epidemic on networks by incorporating key factors in testing data and evaluating the trade-off between controlling the growth-rate of the epidemic and the cost of NPIs. Results show the importance of early testing and the risk of a second wave of infections if NPIs are prematurely withdrawn.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Article
Computer Science, Theory & Methods
Santiago Figueroa-Lorenzo et al.
ACM COMPUTING SURVEYS
(2020)
Article
Computer Science, Information Systems
Jieren Cheng et al.
CMC-COMPUTERS MATERIALS & CONTINUA
(2020)
Article
Computer Science, Theory & Methods
Dawei Zhao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2019)
Article
Computer Science, Theory & Methods
Lu-Xing Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2019)
Article
Computer Science, Hardware & Architecture
Shigen Shen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2019)
Article
Automation & Control Systems
Emiliano Sisinni et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2018)
Article
Computer Science, Information Systems
Shigen Shen et al.
IEEE INTERNET OF THINGS JOURNAL
(2018)
Article
Engineering, Electrical & Electronic
Shin-Ming Cheng et al.
IEEE COMMUNICATIONS MAGAZINE
(2017)
Article
Computer Science, Software Engineering
Chandan Kumar Behera et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY
(2017)
Article
Engineering, Multidisciplinary
Lu-Xing Yang et al.
APPLIED MATHEMATICAL MODELLING
(2017)
Article
Computer Science, Hardware & Architecture
Soheil Eshghi et al.
IEEE-ACM TRANSACTIONS ON NETWORKING
(2016)