Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the
emerging Internet of Things (IoT) has gained a lot of attention from the government …
emerging Internet of Things (IoT) has gained a lot of attention from the government …
Lightweight cryptography in IoT networks: A survey
With the advent of advanced technology, the IoT has made possible the connection of
numerous devices that can collect vast volumes of data. Hence, the demands of IoT security …
numerous devices that can collect vast volumes of data. Hence, the demands of IoT security …
Ai-based mobile edge computing for iot: Applications, challenges, and future scope
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
Optimal resource allocation in energy-efficient Internet-of-Things networks with imperfect CSI
Internet of Things (IoT) is an emerging networking paradigm that enhances smart device
communications through Internet-enabled systems. Due to massive IoT devices connectivity …
communications through Internet-enabled systems. Due to massive IoT devices connectivity …
Survey on edge computing security
H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
With the advent of the Internet of Everything, emerging application scenarios including
autonomous driving, immersive games based on VR or AR technology, and Industrial …
autonomous driving, immersive games based on VR or AR technology, and Industrial …
Perspectives of cybersecurity for ameliorative Industry 4.0 era: A review-based framework
Purpose Industry 4.0 refers to the interconnection of cyber-physical systems, which connects
the physical and digital worlds by collecting digital data from physical objects/processes …
the physical and digital worlds by collecting digital data from physical objects/processes …
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …
data storage and processing power, without requiring special or direct administration by …
The Future Development Direction of Cloud‐Associated Edge‐Computing Security in the Era of 5G as Edge Intelligence
OR Devi, J Webber, A Mehbodniya… - Scientific …, 2022 - Wiley Online Library
By introducing the Internet‐of‐Everything, new usage situations such as self‐directed
movement and vivid competitions constructed upon Virtual Reality or Augmented Reality …
movement and vivid competitions constructed upon Virtual Reality or Augmented Reality …
Secure user authentication and key agreement scheme for IoT device access control based smart home communications
S Uppuluri, G Lakshmeeswari - Wireless Networks, 2023 - Springer
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective
interactional communication strategies between the devices in the smart home system. With …
interactional communication strategies between the devices in the smart home system. With …
Energy-efficient resource allocation and data transmission of cell-free Internet of Things
X Zhang, H Qi, X Zhang, L Han - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a huge network consisting of various information-sensing
devices combined with the Internet. The IoT aims to connect all things with the network to …
devices combined with the Internet. The IoT aims to connect all things with the network to …