Deep learning-based key transmission (DLKT) protocol for secured group communication in cloud

[1]  Liang Sun,et al.  Multi-View Transformation via Mutual-Encoding InfoGenerative Adversarial Networks , 2018, IEEE Access.

[2]  Zheng Yan,et al.  Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications , 2018, IEEE Transactions on Industrial Informatics.

[3]  Yong Xiang,et al.  Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications , 2018, IEEE Access.

[4]  Jian Shen,et al.  Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.

[5]  Xia Li,et al.  Road Detection From Remote Sensing Images by Generative Adversarial Networks , 2018, IEEE Access.

[6]  Yuhui Zheng,et al.  Recent Progress on Generative Adversarial Networks (GANs): A Survey , 2019, IEEE Access.

[7]  Shunming Li,et al.  Generalization of Deep Neural Networks for Imbalanced Fault Classification of Machinery Using Generative Adversarial Networks , 2019, IEEE Access.

[8]  Rosdiadee Nordin,et al.  Adaptive Neural Fuzzy Inference System for Accurate Localization of Wireless Sensor Network in Outdoor and Indoor Cycling Applications , 2018, IEEE Access.

[9]  Basav Roychoudhury,et al.  Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks , 2017, Secur. Commun. Networks.

[10]  Sang-Wook Kim,et al.  Collaborative Adversarial Autoencoders: An Effective Collaborative Filtering Model Under the GAN Framework , 2019, IEEE Access.

[11]  Yong Gan,et al.  Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.

[12]  Wenfen Liu,et al.  Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security , 2017, Int. J. Found. Comput. Sci..

[13]  Victor I. Chang,et al.  Key management and key distribution for secure group communication in mobile and cloud network , 2018, Future Gener. Comput. Syst..

[14]  Zahra Ahmadian,et al.  Linear Subspace Cryptanalysis of Harn’s Secret Sharing-Based Group Authentication Scheme , 2018, IEEE Transactions on Information Forensics and Security.

[15]  Muhammad Bilal,et al.  A secure key agreement protocol for dynamic group , 2017, Cluster Computing.

[16]  Muhammad Munwar Iqbal,et al.  Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.

[17]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Linghao Zhang,et al.  Emotion Interaction Recognition Based on Deep Adversarial Network in Interactive Design for Intelligent Robot , 2019, IEEE Access.