Issue 6/2021
Deep Learning and AI in Secure Mobile Environments
Content (31 Articles)
Special Issue on Deep Learning in Mobile and Wireless Networks: Algorithms, Models and Techniques
Yueshen Xu, Yuyu Yin, Li Kuang
Tiny FCOS: a Lightweight Anchor-Free Object Detection Algorithm for Mobile Scenarios
Xiaolong Xu, Wuyan Liang, Jiahan Zhao, Honghao Gao
Edge Network Routing Protocol Base on Target Tracking Scenario
Zhongyi Zhang, Weihua Zhao, Ouhan Huang, Gangyong Jia, Youhuizi Li, Songzhu Mei, Duan Zhao
Tolerance-Oriented Wi-Fi Advertisement Scheduling: A Near Optimal Study on Accumulative User Interests
Wanru Xu, Xiaochen Fan, Tao Wu, Wei Tao, Yue Xi, Panlong Yang, Chang Tian
Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing
Jiaqi Yin, Huibiao Zhu, Yuan Fei
SDTIOA: Modeling the Timed Privacy Requirements of IoT Service Composition: A User Interaction Perspective for Automatic Transformation from BPEL to Timed Automata
Honghao Gao, Yida Zhang, Huaikou Miao, Ramón J. Durán Barroso, Xiaoxian Yang
TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks
Shuyu Chang, Rui Wang, Haiping Huang, Jian Luo
A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification
Noushin Jafarpisheh, Effat J. Zaferani, Mohammad Teshnehlab, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment
Qindong Sun, Xingyu Feng, Shanshan Zhao, Han Cao, Shancang Li, Yufeng Yao
A Multi-modal Data Platform for Diagnosis and Prediction of Alzheimer’s Disease Using Machine Learning Methods
Zhen Pang, Xiang Wang, Xulong Wang, Jun Qi, Zhong Zhao, Yuan Gao, Yun Yang, Po Yang
A Survey On Log Research Of AIOps: Methods and Trends
Jiang Zhaoxue, Li Tong, Zhang Zhenguo, Ge Jingguo, You Junling, Li Liangxiong
TORM: Tunicate Swarm Algorithm-based Optimized Routing Mechanism in IoT-based Framework
Roopali Dogra, Shalli Rani, Sandeep Verma, Sahil Garg, Mohammad Mehedi Hassan
Mapping the Evolution of Intellectual Structure in Information Management Using Author Co-citation Analysis
Carlos Luis González-Valiente, Magda León Santos, Ricardo Arencibia-Jorge, Ed Noyons, Rodrigo Costas
Runtime Verification of Spatio-Temporal Specification Language
Tengfei Li, Jing Liu, Haiying Sun, Xiaohong Chen, Ling Yin, Xia Mao, Junfeng Sun
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users
Guichuan Zhao, Qi Jiang, Xiaohan Huang, Xindi Ma, Youliang Tian, Jianfeng Ma
Edge User Allocation in Overlap Areas for Mobile Edge Computing
Fangzheng Liu, Bofeng Lv, Jiwei Huang, Sikandar Ali
PR-RCUC: A POI Recommendation Model Using Region-Based Collaborative Filtering and User-Based Mobile Context
Jun Zeng, Haoran Tang, Yizhu Zhao, Min Gao, Junhao Wen
Point-of-Interest Recommendation with User’s Privacy Preserving in an IoT Environment
Guoming Zhang, Lianyong Qi, Xuyun Zhang, Xiaolong Xu, Wanchun Dou
Self-Organised Collision-Free Flocking Mechanism in Heterogeneous Robot Swarms
Zhe Ban, Junyan Hu, Barry Lennox, Farshad Arvin
Fast Blind Deblurring of QR Code Images Based on Adaptive Scale Control
Rongjun Chen, Zhijun Zheng, Junfeng Pan, Yongxing Yu, Huimin Zhao, Jinchang Ren
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
Hanshu Hong, Ximeng Liu, Zhixin Sun
Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks
Liangyi Gong, Chundong Wang, Hong Yang, Zhiyuan Li, Zhentang Zhao
New Engineering Method for the Risk Assessment: Case Study Signal Jamming of the M-Health Networks
Kamel Karoui, Fakher Ben Ftima
Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT
Hany F. Atlam, Robert J. Walters, Gary B. Wills, Joshua Daniel