Q‐learning based flexible task scheduling in a global view for the Internet of Things

J Ge, B Liu, T Wang, Q Yang, A Liu… - Transactions on …, 2021 - Wiley Online Library
With billions of sensor‐based devices connected to the Internet of Things (IoT), it is a pivotal
issue to design an effective task scheduling scheme when the resource of sensor nodes is …

Privacy-preserving searchable encryption in the intelligent edge computing

Q Chen, K Fan, K Zhang, H Wang, H Li… - Computer Communications, 2020 - Elsevier
In intelligent edge computing, the private data of users are partly or entirely outsourced to
the intelligent edge nodes for processing. To enforce security and privacy on edge network …

A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds

C Xu, L Yu, L Zhu, C Zhang - Peer-to-Peer Networking and Applications, 2021 - Springer
In data outsourcing services, to ensure data security and user privacy, data is usually stored
in cloud servers in ciphertext form. This method makes users face the problem of how to …

B+-Tree Based Multi-Keyword Ranked Similarity Search Scheme Over Encrypted Cloud Data

H Shen, L Xue, H Wang, L Zhang, J Zhang - IEEE Access, 2021 - ieeexplore.ieee.org
With the sustained evolution and expeditious popularization of cloud computing, an ever-
increasing number of individuals and enterprises are encouraged to outsource data to cloud …

Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network

X Yan, P Yin, Y Tang, S Feng - Connection Science, 2022 - Taylor & Francis
In an intelligent edge network, data owners encrypt data and outsource it to the edge servers
to prevent the leakage of data and user information. It is a research issue to achieve efficient …

Vector Sum Range Decision for Verifiable Multiuser Fuzzy Keyword Search in Cloud-Assisted IoT

J Han, L Qi, J Zhuang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
To better leverage the massive data obtained by Internet of Things (IoT) devices, an
increasing number of IoT applications are choosing to outsource data to the cloud. However …

Research on Efficiency in Credit Risk Prediction Using Logistic‐SBM Model

D Li, L Li - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
Network lending, an innovative financial lending product, is separated from traditional
financial media and implemented on the Internet platform. We study the credit risk prediction …

A remote sensing encrypted data search method based on a novel double-chain

X Yan, P Yin, Y Tang, S Feng - Connection Science, 2023 - Taylor & Francis
Remote sensing is considered to be a key technology for the development of smart cities. By
analysing the data obtained by remote sensing, it is effective to manage and develop smart …

iForest: An informed resource search strategy in mobile P2P networks

S Zhou, T Zhang, X Meng - Peer-to-Peer Networking and Applications, 2021 - Springer
With the increasing applications of the mobile P2P networks, how to improve the resource
search performance has been an important research focus. Peers' features of strong …

[HTML][HTML] Research on network lending risk analysis based on platform efficiency

D Li, J Xu, L Li - Journal of Financial Risk Management, 2021 - scirp.org
Optimizing the financial risk control mechanism is very important for small and medium-sized
enterprises. It is an important foundation for lending companies to continue to operate …