Issue Date | Title | Author(s) |
2021-04-01 | 6g-enabled short-term forecasting for large-scale traffic flow in massive iot based on time-aware locality-sensitive hashing | Wang, F; Zhu, M; Wang, M; Khosravi, MR; Ni, Q; Yu, S; Qi, L |
2020-01-01 | A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud | Liu, J; Wang, X; Shen, S; Yue, G; Yu, S; Li, M |
2020-07-01 | THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network | Fang, L; Li, Y; Yun, X; Wen, Z; Ji, S; Meng, W; Cao, Z; Tanveer, M |
2018-03-15 | Influence analysis in social networks: A survey | Peng, S; Zhou, Y; Cao, L; Yu, S; Niu, J; Jia, W |
2021-03-01 | PoisonGAN: Generative Poisoning Attacks against Federated Learning in Edge Computing Systems | Zhang, J; Chen, B; Cheng, X; Binh, HTT; Yu, S |
2021-01-01 | Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things | Xu, Q; Su, Z; Zhang, K; Yu, S |
2020-01-15 | Efficient measurement of round-trip link delays in software-defined networks | Wang, X; Yang, Y; Liu, H; Ren, J; Xu, S; Wang, S; Yu, S |
2020-12-15 | Blockchain for Internet of things applications: A review and open issues | Chen, F; Xiao, Z; Cui, L; Lin, Q; Li, J; Yu, S |
2020-11-01 | Privacy-Preserving Federated Learning in Fog Computing | Zhou, C; Fu, A; Yu, S; Yang, W; Wang, H; Zhang, Y |
2021-03-15 | Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation | Xiao, Y; Xiao, L; Lu, X; Zhang, H; Yu, S; Poor, HV |