Ausgabe 6/2020
Includes a Special Issue on Security and Privacy of Machine Learning Assisted P2P Networks
Inhalt (41 Artikel)
A novel heuristic based energy efficient routing strategy in wireless sensor network
G. S. Binu, B. Shajimohan
Reliable data dissemination for the Internet of Things using Harris hawks optimization
Ali Seyfollahi, Ali Ghaffari
Correction to: Reliable data dissemination for the internet of things using Harris hawks optimization
Ali Seyfollahi, Ali Ghaffari
SINR based association algorithm for indoor device-to-device communication networks
Sreedevi A. G., T. Rama Rao
An analytical model for churn process in Bitcoin network with ordinary and relay nodes
Saeideh G. Motlagh, Jelena Mišić, Vojislav B. Mišić
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
R. Shashidhara, Sriramulu Bojjagani, Anup Kumar Maurya, Saru Kumari, Hu Xiong
Multi-keyword score threshold and B+ tree indexing based top-K query retrieval in cloud
K. Karthika Lekshmi, M. Vigilson Prem
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
K. Sumathi, P. Pandiaraja
An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks
S. K. Sathya Lakshmi Preeth, R. Dhanalakshmi, P. Mohamed Shakeel
RETRACTED ARTICLE: Machine learning based multi scale parallel K-means++ clustering for cloud assisted internet of things
S. K. Mydhili, S. Periyanayagi, S. Baskar, P. Mohamed Shakeel, P. R. Hariharan
A distributed intelligent mobile application for analyzing travel big data analytics
L. Maria Michael Visuwasam, D. Paul Raj
Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET
R. P. Premanand, A. Rajaram
An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN
R. Elavarasan, K. Chitra
A reward based connectivity-aware IoV neighbor selection for improving reliability in healthcare information exchange
Tamizharasi Thirugnanam, Muhammad Rukunuddin Ghalib
IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector
BalaAnand Muthu, C. B. Sivaparthipan, Gunasekaran Manogaran, Revathi Sundarasekar, Seifedine Kadry, A. Shanthini, Antony Dasel
Channel aware optimized proportional fair scheduler for LTE downlink
B. Satheesh Monikandan, A. Sivasubramanian, S. P. K. Babu, G. K. D. Prasanna Venkatesan, C. Arunachalaperumal
RETRACTED ARTICLE: Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography
A. Agasthian, Rajendra Pamula, L. A. Kumaraswamidhas
Advanced delay assured numerical heuristic modelling for peer to peer project management in cloud assisted internet of things platform
Bo Wang, Tian-yu Fan, Xiang-tian Nie
Improved network lifetime to identify unexploited PATH using series cornerstone PATH algorithm in wireless sensor networks
A. S. Anshad, R. Radhakrishnan
Dynamic allocation strategy of VM resources with fuzzy transfer learning method
Xiang Wu, Huanhuan Wang, Wei Tan, Dashun Wei, Minyu Shi
A high-performance scheduling algorithm using greedy strategy toward quality of service in the cloud environments
Zhou Zhou, Hongmin Wang, Huailing Shao, Lifeng Dong, Junyang Yu
Improved community structure discovery algorithm based on combined clique percolation method and K-means algorithm
Zhou Zhou, Zhuopeng Xiao, WeiHong Deng
Security and privacy of machine learning assisted P2P networks
Hongwei Li, Rongxing Lu, Mohamed M. E. A. Mahmoud
CSNN: Password guessing method based on Chinese syllables and neural network
Yi Zhang, Hequn Xian, Aimin Yu
Efficient distributed privacy-preserving collaborative outlier detection
Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma
Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
Youwen Zhu, Xingxin Li
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
Qian Wang, Zhipeng Gao, Zifan Li, Xiaojiang Du, Mohsen Guizani
A trust-based minimum cost and quality aware data collection scheme in P2P network
Yingying Ren, Zhiwen Zeng, Tian Wang, Shaobo Zhang, Guoming Zhi
Efficient and secure k-nearest neighbor query on outsourced data
Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions
Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment
Haoyang Wang, Kai Fan, Hui Li, Yintang Yang
Adaptive privacy-preserving federated learning
Xiaoyuan Liu, Hongwei Li, Guowen Xu, Rongxing Lu, Miao He