MEC-assisted immersive VR video streaming over terahertz wireless networks: A deep reinforcement learning approach
J Du, FR Yu, G Lu, J Wang, J Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Immersive virtual reality (VR) video is becoming increasingly popular owing to its enhanced
immersive experience. To enjoy ultrahigh resolution immersive VR video with wireless user …
immersive experience. To enjoy ultrahigh resolution immersive VR video with wireless user …
Cryptography in wireless multimedia sensor networks: A survey and research directions
DG Costa, S Figuerêdo, G Oliveira - Cryptography, 2017 - mdpi.com
Wireless multimedia sensor networks will play a central role in the Internet of Things world,
providing content-rich information for an uncountable number of monitoring and control …
providing content-rich information for an uncountable number of monitoring and control …
Soft actor–critic DRL for live transcoding and streaming in vehicular fog-computing-enabled IoV
With the rapid development of automotive industry and telecommunication technologies, live
streaming services in the Internet of Vehicles (IoV) play an even more crucial role in …
streaming services in the Internet of Vehicles (IoV) play an even more crucial role in …
Securing data exchange in wireless multimedia sensor networks: perspectives and challenges
M Ghadi, L Laouamer, T Moulahi - Multimedia tools and applications, 2016 - Springer
The emerging use of Wireless Multimedia Sensor Networks (WMSNs) and communication
facilities have increased the need for network security measures to protect different types of …
facilities have increased the need for network security measures to protect different types of …
Audio encryption based on the cosine number transform
JB Lima, EF da Silva Neto - Multimedia Tools and Applications, 2016 - Springer
In this paper, we introduce an audio encryption scheme based on the cosine number
transform (CNT). The transform, which is defined over a finite field, is recursively applied to …
transform (CNT). The transform, which is defined over a finite field, is recursively applied to …
An autonomous lane-changing system with knowledge accumulation and transfer assisted by vehicular blockchain
Inappropriate lane following and changing behaviors of connected and autonomous
vehicles (CAVs) can result in accidents, such as rear-end collision and side collision. To …
vehicles (CAVs) can result in accidents, such as rear-end collision and side collision. To …
An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks (WBAN)
In this paper, we proposed an integrated biometric-based security framework for wireless
body area networks, which takes advantage of biometric features shared by body sensors …
body area networks, which takes advantage of biometric features shared by body sensors …
Compressed sensing based selective encryption with data hiding capability
This paper proposes a joint selective encryption and data hiding scheme based on
compressed sensing (CS), with a focus to its application in secure imaging. Specifically …
compressed sensing (CS), with a focus to its application in secure imaging. Specifically …
CP‐ABE‐Based Secure and Verifiable Data Deletion in Cloud
J Ma, M Wang, J Xiong, Y Hu - Security and Communication …, 2021 - Wiley Online Library
Cloud data, the ownership of which is separated from their administration, usually contain
users' private information, especially in the fifth‐generation mobile communication (5G) …
users' private information, especially in the fifth‐generation mobile communication (5G) …
A Privacy‐Preserving Personalized Service Framework through Bayesian Game in Social IoT
It is enormously challenging to achieve a satisfactory balance between quality of service
(QoS) and users' privacy protection along with measuring privacy disclosure in social …
(QoS) and users' privacy protection along with measuring privacy disclosure in social …