Issue Date | Title | Author(s) |
2018-02-01 | DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks | Cui, L; Hu, H; Yu, S; Yan, Q; Ming, Z; Wen, Z; Lu, N |
2018-07-01 | Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU | Wang, X; Zhang, Q; Ren, J; Xu, S; Wang, S; Yu, S |
2018-09-15 | Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server | Fu, A; Li, S; Yu, S; Zhang, Y; Sun, Y |
2017-08-01 | A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion | Shen, S; Ma, H; Fan, E; Hu, K; Yu, S; Liu, J; Cao, Q |
2020-11-15 | Smart contracts for blockchain-based reputation systems: A systematic literature review | Almasoud, AS; Hussain, FK; Hussain, OK |
2020-02-15 | PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks | Nobakht, M; Sui, Y; Seneviratne, A; Hu, W |
2018-02-15 | DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems | Fu, A; Li, Y; Yu, S; Yu, Y; Zhang, G |
2021-04-01 | 6g-enabled short-term forecasting for large-scale traffic flow in massive iot based on time-aware locality-sensitive hashing | Wang, F; Zhu, M; Wang, M; Khosravi, MR; Ni, Q; Yu, S; Qi, L |
2020-01-01 | A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud | Liu, J; Wang, X; Shen, S; Yue, G; Yu, S; Li, M |
2020-07-01 | THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network | Fang, L; Li, Y; Yun, X; Wen, Z; Ji, S; Meng, W; Cao, Z; Tanveer, M |