![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,328 Result(s)
-
Article
An Unequal Clustering Energy Consumption Balancing Routing Algorithm of UAV Swarm Based on Ultraviolet Secret Communication
Focusing on the tasks collaboration requirements of Unmanned Aerial Vehicle (UAV) swarm in complex battlefield environment, it is especially important to ensure the reliability of routing communication within ...
-
Article
Energy-efficiently collaborative data downloading in optical satellite networks
Optical satellite networks (OSNs) play an important role in space applications since it has some merits such as high data rate and low power. Increasing space applications generate a large amount of data on sa...
-
Article
Smart preschool education live streaming: VR-driven optimization strategy
The construction of smart city has become the frontier trend of city development. Smart education shows the inner beauty of smart city, and smart education is the connotation extension of educational informati...
-
Article
Refactoring business process models with process fragments substitution
Since business processes are important assets of enterprises, thousands of business processes are modeled. After modeling business process models, a problem arises here is how to improve the efficiency of thes...
-
Article
A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing
In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed around the base stations. Generally, due to the uneven distribution and mobility of users, one ED is required to serve multip...
-
Article
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid
Double auction provides a cost-effective manner for sellers/buyers in smart grid. Due to concerns about information leakage, the asks/bids from sellers/buyers are sealed, making it challenging to select potent...
-
Article
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids
As a classic cyber-physical system, smart grids often suffer from various types of attacks, one of which the most threatening attacks is coordinated cyber-physical attack (CCPA). In order to improve the robust...
-
Article
A privacy protection scheme for green communication combining digital steganography
In order to ensure the sustainable development of the Internet of Things (IoT), researchers have been exploring and making technological innovations in the fields of smart grid as well as green communication a...
-
Article
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption
While it is well known that privacy-preserving cox regression generally consists of a semi-honest cloud service provider (CSP) who performs curious-but-honest computations on ciphertexts to train the cox model...
-
Article
Byzantine detection for federated learning under highly non-IID data and majority corruptions
Federated Learning (FL) is a privacy-preserving paradigm which enables multiple clients to jointly learn a model and keeps their data local. However, the nature of FL leaves the vulnerability to Byzantine attacks
-
Article
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine
The progress of machine learning has revealed its immense potential in emerging medical diagnosis application. This application enables medical users to access diagnosis service that utilizes machine learning ...
-
Article
Intelligent reflecting surface aided secure MIMO wireless communication
Intelligent reflecting surface (IRS) holds tremendous potential as an efficient solution for achieving a dynamically reconfigurable wireless communication environment in a cost-efficient manner. This work expl...
-
Article
EALSO: joint energy-aware and latency-sensitive task offloading for artificial Intelligence of Things in vehicular fog computing
Artificial Intelligence of Things (AIoT) is an emerging field within the Internet of Things (IoT) that caters to the growing demand for intelligent computing and communications. Vehicular fog computing (VFC) w...
-
Article
An Entorhinal-Hippocampal Loop Model Based on Non-negative Sparse Coding
In our study, we investigate how the brain maps environmental spaces into understandable maps through hippocampal place cells and entorhinal cortex grid cells. We uncover that the hippocampus and entorhinal co...
-
Article
A blockchain-based auditable deduplication scheme for multi-cloud storage
Cloud storage has attracted widespread attention due to its advantages such as convenience, low cost, and easy scalability. With the explosion of cloud data volumes, security and performance issues are becomin...
-
Article
An INS/UWB joint indoor positioning algorithm based on hypothesis testing and yaw angle
Wireless sensor network (WSN) is widely used in indoor positioning, but indoor positioning is susceptible to non-line-of-sight (NLOS) propagation environment. The inertial navigation system (INS) does not depe...
-
Article
Research on Moving Liquid Level Detection Method of Viscometer in Dynamic Scene
In order to solve the problem of false detection of the moving liquid level caused by the vibration of the constant temperature water bath, this paper combines the Type-2 Fuzzy Gaussian Mixture Model (T2-FGMM)...
-
Article
Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks
The security of wireless access is studied for the integrated wireless communications and sensing in 6G Internet of Everything networks. The scaling law of the secured communications and that of the secured se...
-
Article
Open AccessRetraction Note: Application of deep learning in Mandarin Chinese lip-reading recognition
-
Article
Open AccessRetraction Note: Optimized design and application research of smart interactive screen for wireless networks based on federated learning