Ausgabe 3/2021
Includes 2 Special Issues: Special Issue on Privacy-Preserving Computing; Special Issue on P2P Computing for Deep Learning
Inhalt (55 Artikel)
A mathematical model to describe resource discovery failure in distributed exascale computing systems
Elham Adibi, Ehsan Mousavi Khaneghah
An efficient latency aware resource provisioning in cloud assisted mobile edge framework
Rajasekhar Bandapalle Mulinti, M. Nagendra
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs
Nan Zhao, Nianmin Yao, Zhenguo Gao
Non-cryptography countermeasure against controllable event triggering attack in WSNs
Haoran Hu, Wei Chang
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network
Varun Kurri, Vishweshvaran Raja, P. Prakasam
A novel trust management method to preserve privacy in vehicular ad-hoc networks
Davood Behzad, Nazbanoo Farzaneh
Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks
A. Samson Arun Raj, Yogesh Palanichamy
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications
Marwa Ibrahim, Hassan Harb, Ali Mansour, Abbass Nasser, Christophe Osswald
Modeling & analysis of software defined networks under non-stationary conditions
Navya Vuppalapati, T. G. Venkatesh
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach
Yipin Zhang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Yutong Cai
New incentive mechanism to enhance cooperation in wireless P2P networks
Nitin Singha, Yatindra Nath Singh
High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism
Gopala Krishnan C, Gomathi S, Anusha Bamini A.M
Towards software defined low maintenance structured peer-to-peer overlays
Nitin Shukla, Dipmalya Datta, Mayank Pandey, Shashank Srivastava
SDN-based offloading policy to reduce the delay in fog-vehicular networks
Alla Abbas Khadir, Seyed Amin Hosseini Seno
Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks
Alla Abbas Khadir, Seyed Amin Hosseini Seno
A provably secure RFID authentication protocol based on ECQV for the medical internet of things
Abhay Kumar Agrahari, Shirshu Varma
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage
Uma Sankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari
Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks
Vrajesh Kumar Chawra, Govind P. Gupta
Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs
Jian Chen, Yunhe Xie, Jie Jia, Mingyang Zhang, Qinghu Wang, Xingwei Wang
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs
Noureddine Moussa, Abdelbaki El Belrhiti El Alaoui
Advances in privacy-preserving computing
Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing
Qianjun Wei, Qiang Li, Zhipeng Zhou, ZhengQiang Ge, Yonggang Zhang
A location privacy protection scheme for convoy driving in autonomous driving era
Xin Ye, Jin Zhou, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin
A novel spread estimation based abnormal flow detection in high-speed networks
Xiaofei Bu, Yu-E Sun, Yang Du, Xiaocan Wu, Boyu Zhang, He Huang
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning
Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding
Three-stage Stackelberg game based edge computing resource management for mobile blockchain
Yuqi Fan, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi, Xiaohui Yuan
An improved steganography without embedding based on attention GAN
Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-qiu Zhao
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems
Mingfu Xue, Can He, Jian Wang, Weiqiang Liu
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems
Bang Tran, Xiaohui Liang
A robust and secure multi-authority access control system for cloud storage
Jin Gu, Jianqiang Shen, Baoyun Wang
A uniformization-based approach to preserve individuals’ privacy during process mining analyses
Edgar Batista, Agusti Solanas
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks
Zihao Zhu, Yulin Xu, Zhou Su
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
Manojkumar Vivekanandan, Sastry V. N., Srinivasulu Reddy U.
A machine learning based approach for user privacy preservation in social networks
Yuanming Zhang, Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data
Shashidhar Virupaksha, Venkatesulu Dondeti
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
J. Andrew Onesimu, J. Karthikeyan, Yuichi Sei
Impact of data correlation on privacy budget allocation in continuous publication of location statistics
D. Hemkumar, S. Ravichandra, D. V. L. N. Somayajulu
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities
Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail Babenko, Gleb Radchenko, Arutyun Avetisyan, Alexander Yu Drozdov
ASFGNN: Automated separated-federated graph neural network
Longfei Zheng, Jun Zhou, Chaochao Chen, Bingzhe Wu, Li Wang, Benyu Zhang
Obfuscation of images via differential privacy: From facial images to general images
William L. Croft, Jörg-Rüdiger Sack, Wei Shi
Guest editorial special issue on “P2P computing for deep learning”
Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin
Group task allocation approach for heterogeneous software crowdsourcing tasks
Xiaojing Yin, Jiwei Huang, Wei He, Wei Guo, Han Yu, Lizhen Cui
The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation
Xu Ding, Jing Wang, Chong Zhao, Peng Zhang, Yucheng Wu, Honghao Gao
Surface and high-altitude combined rainfall forecasting using convolutional neural network
Pengcheng Zhang, Wennan Cao, Wenrui Li
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges
Sahil Khatri, Hrishikesh Vachhani, Shalin Shah, Jitendra Bhatia, Manish Chaturvedi, Sudeep Tanwar, Neeraj Kumar
Improved differentiable neural architecture search for single image super-resolution
Yu Weng, Zehua Chen, Tianbao Zhou
Influencing factors analysis in pear disease recognition using deep learning
Fang Yang, Fuzhong Li, Kai Zhang, Wuping Zhang, Shancang Li
AENEA: A novel autoencoder-based network embedding algorithm
Xiaolong Xu, Haoyan Xu, Yang Wang, Jing Zhang