Trends in Computational Intelligence, Security and Internet of Things: Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings
暂无分享,去创建一个
[1] M. B. Clowes,et al. A New Technique in Automatic Character Recognition , 1961, Comput. J..
[2] S. Yoshizawa,et al. An Active Pulse Transmission Line Simulating Nerve Axon , 1962, Proceedings of the IRE.
[3] Ming-Kuei Hu,et al. Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.
[4] H. McKean. Nagumo's equation , 1970 .
[5] Stuart P. Nishenko,et al. Seismic gaps and plate tectonics: Seismic potential for major boundaries , 1979 .
[6] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[7] Andrea Sgarro. Error probabilities for simple substitution ciphers , 1983, IEEE Trans. Inf. Theory.
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[9] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[10] Vladimir Kossobokov,et al. Intermediate term earthquake prediction in the area of Greece: Application of the algorithm M8 , 1990 .
[11] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[12] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[14] J. Deas. Fly-By-Wire for Experimental Aircraft ? , 1993 .
[15] L M Adleman,et al. Molecular computation of solutions to combinatorial problems. , 1994, Science.
[16] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[17] Thomas P. Jakobsen,et al. A Fast Method for the Cryptanalysis of Substitution Ciphers , 1995 .
[18] G. L. Morgan,et al. Quantum Cryptography over Underground Optical Fibers , 1996, CRYPTO.
[19] N. Gisin,et al. “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.
[20] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[21] Sir James Lighthill. A Critical Review of Van: Earthquake Prediction From Seismic Electrical Signals , 1996 .
[22] Dave Jaggar,et al. Arm Architecture And Systems , 1997, IEEE Micro.
[23] Johannes Fürnkranz,et al. A Study Using $n$-gram Features for Text Categorization , 1998 .
[24] Yehuda Ben-Zion,et al. Transitions between Gutenberg-Richter and Characteristic Earthquake behavior in Simple Mean-Field Models of Heterogeneous Faults , 1998 .
[25] Soteris A. Kalogirou,et al. Applications of artificial neural networks in energy systems , 1999 .
[26] Robert W. Simpson,et al. A physically-based earthquake recurrence model for estimation of long-term earthquake probabilities , 1999 .
[27] L. Knopoff,et al. The magnitude distribution of declustered earthquakes in Southern California. , 2000, Proceedings of the National Academy of Sciences of the United States of America.
[28] J. Kirschvink. Earthquake Prediction by Animals: Evolution and Sensory Perception , 2000 .
[29] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[30] Paul A. Viola,et al. Robust Real-time Object Detection , 2001 .
[31] Francisco Herrera,et al. Generating the knowledge base of a fuzzy rule-based system by the genetic learning of the data base , 2001, IEEE Trans. Fuzzy Syst..
[32] V. P. Plagianakos,et al. Chaotic analysis of seismic time series and short term forecasting using neural networks , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).
[33] Yali Amit,et al. 2D Object Detection and Recognition: Models, Algorithms, and Networks , 2002 .
[34] P. G. Vicente,et al. Heat transfer and pressure drop for low Reynolds turbulent flow in helically dimpled tubes , 2002 .
[35] P. G. Vicente,et al. Experimental study of mixed convection and pressure drop in helically dimpled tubes for laminar and transition flow , 2002 .
[36] P. Varotsos,et al. Physical properties of the variations of the electric field of the earth preceding earthquakes, I , 1984 .
[37] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[38] Nathalie Japkowicz,et al. The class imbalance problem: A systematic study , 2002, Intell. Data Anal..
[39] A. Bergles. ExHFT for fourth generation heat transfer technology , 2002 .
[40] T. Yato,et al. Complexity and Completeness of Finding Another Solution and Its Application to Puzzles , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[41] Daniel M. Germán,et al. The GNOME project: a case study of open source, global software development , 2003, Softw. Process. Improv. Pract..
[42] Jose A. Gutierrez,et al. Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4 , 2003 .
[43] Jingjing Lu,et al. Comparing naive Bayes, decision trees, and SVM with AUC and accuracy , 2003, Third IEEE International Conference on Data Mining.
[44] P. G. Vicente,et al. Experimental investigation on heat transfer and frictional characteristics of spirally corrugated tubes in turbulent flow at different Prandtl numbers , 2004 .
[45] V. Zimparov. Prediction of friction factors and heat transfer coefficients for turbulent flow in corrugated tubes combined with twisted tape inserts. Part 2: heat transfer coefficients , 2004 .
[46] Ashish Goel,et al. Multi-processor scheduling to minimize flow time with ε resource augmentation , 2004, STOC '04.
[47] Myung J. Lee,et al. A Comprehensive Performance Study of IEEE 802 . 15 . 4 , 2004 .
[48] Gustavo E. A. P. A. Batista,et al. A study of the behavior of several methods for balancing machine learning training data , 2004, SKDD.
[49] Anupam Dewan,et al. Review of passive heat transfer augmentation techniques , 2004 .
[50] P. G. Vicente,et al. MIXED CONVECTION HEAT TRANSFER AND ISOTHERMAL PRESSURE DROP IN CORRUGATED TUBES FOR LAMINAR AND TRANSITION FLOW , 2004 .
[51] Hamid R. Tizhoosh,et al. Opposition-Based Learning: A New Scheme for Machine Intelligence , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[52] A. Viedma,et al. Experimental study of heat transfer enhancement with wire coil inserts in laminar-transition-turbulent regimes at different Prandtl numbers , 2005 .
[53] H. Yasukawa,et al. Multi-layer neural network for precursor signal detection in electromagnetic wave observation applied to great earthquake prediction , 2005 .
[54] Hui Han,et al. Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.
[55] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[56] Hisao Ishibuchi,et al. Rule weight specification in fuzzy rule-based classification systems , 2005, IEEE Transactions on Fuzzy Systems.
[57] Eduardo Tovar,et al. GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[58] Zhi-Hua Zhou,et al. Ieee Transactions on Knowledge and Data Engineering 1 Training Cost-sensitive Neural Networks with Methods Addressing the Class Imbalance Problem , 2022 .
[59] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.
[60] Eduardo Tovar,et al. i-GAME: an implicit GTS allocation mechanism in IEEE 802.15.4 for time-sensitive wireless sensor networks , 2006, 18th Euromicro Conference on Real-Time Systems (ECRTS'06).
[61] Mehmet Siraç Özerdem,et al. Self-organized maps based neural networks for detection of possible earthquake precursory electric field patterns , 2006, Adv. Eng. Softw..
[62] Hiroki Takesue,et al. Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.
[63] S. Saha,et al. Thermohydraulics of Laminar Flow Through Rectangular and Square Ducts With Transverse Ribs and Twisted Tapes , 2006 .
[64] Gihwon Kwon,et al. Optimized CNF Encoding for Sudoku Puzzles ? , 2006 .
[65] Conor Ryan,et al. Solving Sudoku with the GAuGE System , 2006, EuroGP.
[66] Rhyd Lewis,et al. Metaheuristics can solve sudoku puzzles , 2007, J. Heuristics.
[67] Hiroki Takesue,et al. Differential phase shift quantum key distribution using single-photon detectors based on a sinusoidally gated InGaAs∕InP avalanche photodiode , 2007 .
[68] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[69] ASHIF PANAKKAT,et al. Neural Network Models for Earthquake Magnitude Prediction Using Multiple seismicity Indicators , 2007, Int. J. Neural Syst..
[70] Peter I. Corke,et al. Transforming Agriculture through Pervasive Wireless Sensor Networks , 2007, IEEE Pervasive Computing.
[71] Timo Mantere,et al. Solving, rating and generating Sudoku puzzles with GA , 2007, 2007 IEEE Congress on Evolutionary Computation.
[72] A. A. Sulaiman,et al. Earthquake prediction technique based on GPS dual frequency system in equatorial region , 2008, 2008 IEEE International RF and Microwave Conference.
[73] Haibo He,et al. ADASYN: Adaptive synthetic sampling approach for imbalanced learning , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[74] Ming-Shi Wang,et al. Genetic-clustering algorithm for intrusion detection system , 2008, Int. J. Inf. Comput. Secur..
[75] A. S. Dalkılıç,et al. Intensive literature review of condensation inside smooth and enhanced tubes , 2009 .
[76] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[77] S. Sri Lakshmi,et al. Model dissection from earthquake time series: A comparative analysis using modern non-linear forecasting and artificial neural network approaches , 2009, Comput. Geosci..
[78] J. F. Crook,et al. A Pencil-and-Paper Algorithm for Solving Sudoku Puzzles , 2009 .
[79] Gouda I. Salama,et al. Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .
[80] Maneesha V. Ramesh,et al. Real-Time Wireless Sensor Network for Landslide Detection , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[81] Chinaruk Thianpong,et al. Compound heat transfer enhancement of a dimpled tube with a twisted tape swirl generator , 2009 .
[82] Jaysonne A. Pacurib,et al. Solving Sudoku Puzzles Using Improved Artificial Bee Colony Algorithm , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
[83] S. Femmam,et al. A Beacon-Aware Device For The Interconnection of Zig Bee Networks , 2009 .
[84] Zhi-Hua Zhou,et al. Exploratory Undersampling for Class-Imbalance Learning , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[85] Sunil Prabhakar,et al. A Rule-Based Classification Algorithm for Uncertain Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[86] Michael D. Ernst,et al. Automatically patching errors in deployed software , 2009, SOSP '09.
[87] Dirk Pesch,et al. MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling , 2009, ADHOCNETS.
[88] Ricardo Moraes,et al. Dynamic GTS Scheduling of Periodic Skippable Slots in IEEE 802.15.4 Wireless Sensor Networks , 2009 .
[89] Jie Qiu,et al. The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[90] Janez Brest,et al. Dynamic optimization using Self-Adaptive Differential Evolution , 2009, 2009 IEEE Congress on Evolutionary Computation.
[91] Victor C. M. Leung,et al. Enabling technologies for wireless body area networks: A survey and outlook , 2009, IEEE Communications Magazine.
[92] Ramarathnam Venkatesan,et al. Tamper-Tolerant Software: Modeling and Implementation , 2009, IWSEC.
[93] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[94] Abdulrahman Alarifi,et al. Earthquakes magnitude predication using artificial neural network in northern Red Sea area , 2009 .
[95] A. W. Date,et al. Heat transfer and pressure drop in a spirally grooved tube with twisted tape insert , 2009 .
[96] Jayanta Kumar Pal,et al. A novel block cipher technique using binary field arithmetic based substitution (BCTBFABS) , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[97] Chiara Buratti,et al. Performance Analysis of IEEE 802.15.4 Beacon-Enabled Mode , 2010, IEEE Transactions on Vehicular Technology.
[98] Abishek Thekkeyil Kunnath,et al. Signal processing for Wireless Geophone Network to detect landslides , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[99] Brendan T. O'Connor,et al. From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series , 2010, ICWSM.
[100] Terrence P. Fries,et al. Evolutionary optimization of a fuzzy rule-based network intrusion detection system , 2010, 2010 Annual Meeting of the North American Fuzzy Information Processing Society.
[101] Yakup Genc,et al. Edge Drawing: A Heuristic Approach to Robust Real-Time Edge Detection , 2010, 2010 20th International Conference on Pattern Recognition.
[102] Yi Zhu,et al. Application of power line communication in smart power Consumption , 2010, ISPLC2010.
[103] Sujoy Kumar Saha,et al. Thermal and friction characteristics of turbulent flow through rectangular and square ducts with transverse ribs and wire-coil inserts , 2010 .
[104] Xin-She Yang,et al. Review of Metaheuristics and Generalized Evolutionary Walk Algorithm , 2011, 1105.3668.
[105] Abishek Thekkeyil Kunnath,et al. Wireless Geophone Network for remote monitoring and detection of landslides , 2011, 2011 International Conference on Communications and Signal Processing.
[106] Shyi-Ming Chen,et al. Weighted Fuzzy Rule Interpolation Based on GA-Based Weight-Learning Techniques , 2011, IEEE Transactions on Fuzzy Systems.
[107] Girts Strazdins,et al. Real time pothole detection using Android smartphones with accelerometers , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[108] Sakir Sezer,et al. Impact of cyber-security issues on Smart Grid , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.
[109] Hamid Mohamadi,et al. Design and analysis of genetic fuzzy systems for intrusion detection in computer networks , 2011, Expert Syst. Appl..
[110] Pedro Pina,et al. Automatic detection of landslide features with remote sensing techniques: Application to Madeira Island , 2011, 2011 IEEE International Geoscience and Remote Sensing Symposium.
[111] Johan Bollen,et al. Twitter mood predicts the stock market , 2010, J. Comput. Sci..
[112] Daniel Gayo-Avello,et al. A Meta-Analysis of State-of-the-Art Electoral Prediction From Twitter Data , 2012, ArXiv.
[113] S. Saha,et al. Heat Transfer Enhancement of Laminar Flow Through a Circular Tube Having Wire Coil Inserts and Fitted With Center-Cleared Twisted Tape , 2012 .
[114] Xiaohui Liang,et al. Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.
[115] Nelishia Pillay,et al. Finding solutions to sudoku puzzles using human intuitive heuristics , 2012, South Afr. Comput. J..
[116] Francisco Herrera,et al. A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[117] Wolfgang Busch,et al. Heavy rainfall-induced landslide detection from very high resolution multi-aspect TerraSAR-X images in Dessie, Ethiopia , 2012, 2012 IEEE International Geoscience and Remote Sensing Symposium.
[118] M. S. Thomas,et al. Integration and security analysis of metering infrastructure , 2012, 2012 IEEE Fifth Power India Conference.
[119] Arputharaj Kannan,et al. A Novel Weighted Fuzzy C –Means Clustering Based on Immune Genetic Algorithm for Intrusion Detection , 2012 .
[120] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[121] Masato Koashi,et al. Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization , 2012, 1208.1995.
[122] P. G. Vicente,et al. The influence of artificial roughness shape on heat transfer enhancement: Corrugated tubes, dimpled tubes and wire coils , 2012 .
[123] Salvatore Venticinque,et al. Agents Based Cloud Computing Interface for Resource Provisioning and Management , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.
[124] Yongtae Shin,et al. A GTS allocation scheme for emergency data transmission in cluster-tree WSNs , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).
[125] Gurjot Singh Gaba,et al. Implementation of Image Enhancement Techniques , 2012 .
[126] Seung Hyong Rhee,et al. GTS allocation for emergency data in low-rate WPAN , 2012, 2012 18th Asia-Pacific Conference on Communications (APCC).
[127] P. Dhavachelvan,et al. Minimizing the makespan using Hybrid algorithm for cloud computing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[128] Guobo Xie,et al. Image Edge Detection Based On Opencv , 2013 .
[129] Benjamin Kerr,et al. Evolutionary rescue from extinction is contingent on a lower rate of environmental change , 2013, Nature.
[130] R. Iyer,et al. A Review of Sudoku Solving using Patterns , 2013 .
[131] Maria Dolores Gil Montoya,et al. A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems , 2013, Soft Comput..
[132] Mikel Galar,et al. Analysing the classification of imbalanced data-sets with multiple classes: Binarization techniques and ad-hoc approaches , 2013, Knowl. Based Syst..
[133] Wei Li,et al. Iowa State University From the SelectedWorks of James Aanstoos 2013 Landslide Detection on Earthen Levees with X-band and L-band Radar Data , 2018 .
[134] S. Swamynathan,et al. Agent based Resource Monitoring System in IaaS Cloud Environment , 2013 .
[135] G. Fussmann,et al. Evolutionary and plastic rescue in multitrophic model communities , 2013, Philosophical Transactions of the Royal Society B: Biological Sciences.
[136] E. Buza,et al. Pothole Detection with Image Processing and Spectral Clustering , 2013 .
[137] Aliakbar Niknafs,et al. A modified dna computing approach to tackle the exponential solution space of the graph coloring problem , 2013, FOCS 2013.
[138] L. Zhang,et al. Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.
[139] M. Hochberg,et al. Evolutionary rescue: an emerging focus at the intersection between ecology and evolution , 2013, Philosophical Transactions of the Royal Society B: Biological Sciences.
[140] Francisco Martínez-Álvarez,et al. Neural networks to predict earthquakes in Chile , 2013, Appl. Soft Comput..
[141] Hossein Arefi,et al. BUILDING EXTRACTION USING SURFACE MODEL CLASSIFICATION , 2013 .
[142] Nuno Pereira,et al. IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints , 2013, Springer Briefs in Electrical and Computer Engineering.
[143] Gao Jinhua,et al. ARP spoofing detection algorithm using ICMP protocol , 2013, 2013 International Conference on Computer Communication and Informatics.
[144] Witold Pedrycz,et al. A genetic design of linguistic terms for fuzzy rule based classifiers , 2013, Int. J. Approx. Reason..
[145] Uzay Kaymak,et al. Exploiting emoticons in sentiment analysis , 2013, SAC '13.
[146] Radu Stoleru,et al. On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..
[147] Anupriya Gogna,et al. Metaheuristics: review and application , 2013, J. Exp. Theor. Artif. Intell..
[148] N. Jazdi,et al. Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.
[149] Taehyeong Kim,et al. Review and Analysis of Pothole Detection Methods , 2014 .
[150] Yu-cong Kuang,et al. Communication between PLC and Arduino Based on Modbus Protocol , 2014, 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and Control.
[151] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[152] G. Varaprasad,et al. Pothole detection and inter vehicular communication , 2014, 2014 IEEE International Conference on Vehicular Electronics and Safety.
[153] Curry J. Cunningham,et al. Evolutionary rescue in a changing world. , 2014, Trends in ecology & evolution.
[154] Birgitte Bak-Jensen,et al. Attacks and their defenses for advanced metering infrastructure , 2014, 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[155] Inderveer Chana,et al. QRSF: QoS-aware resource scheduling framework in cloud computing , 2014, The Journal of Supercomputing.
[156] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[157] Sandeep Venkatesh,et al. An intelligent system to detect, avoid and maintain potholes: A graph theoretic approach , 2014, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU).
[158] Zsolt Csaba Johanyak,et al. Rule base identification toolbox for fuzzy controllers , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).
[159] E. Salvador. Climate-Smart Agriculture in , 2014 .
[160] Golla Varaprasad,et al. Detection of potholes in autonomous vehicle , 2014 .
[161] E. N. Onwuka,et al. Image processing techniques for automated road defect detection: A survey , 2014, 2014 11th International Conference on Electronics, Computer and Computation (ICECCO).
[162] Robert L. Unckless,et al. The Population Genetics of Evolutionary Rescue , 2014, PLoS genetics.
[163] Kanubhai K. Patel,et al. Predictive Rule Discovery for Network Intrusion Detection , 2014, ISI.
[164] Ashish Sharma,et al. Data hiding using dictionary based substitution method in DNA sequences , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).
[165] Myung Ho Kim,et al. Towards Self-Awareness Privacy Protection for Internet of Things Data Collection , 2014, J. Appl. Math..
[166] Deepa Kundur,et al. Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed , 2015, 2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
[167] Reinhard Klette,et al. Robust Vehicle Detection and Distance Estimation Under Challenging Lighting Conditions , 2015, IEEE Transactions on Intelligent Transportation Systems.
[168] S. Pal,et al. Laminar fluid flow and heat transfer through a circular tube having spiral ribs and twisted tapes , 2015 .
[169] Abdelmadjid Bouabdallah,et al. Trusted Execution Environment: What It is, and What It is Not , 2015, TrustCom 2015.
[170] Jing Li,et al. Landslide detection with two satellite images of different spatial resolutions in a probabilistic topic model , 2015, 2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).
[171] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[172] Ramjee Prasad,et al. Bandwidth efficient cluster-based data aggregation for Wireless Sensor Network , 2015, Comput. Electr. Eng..
[173] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[174] Marthinus J. Booysen,et al. Detecting potholes using simple image processing techniques and real-world footage , 2015 .
[175] Dhruba K. Bhattacharyya,et al. Dance Gesture Recognition: A Survey , 2015 .
[176] Afan Galih Salman,et al. Weather forecasting using deep learning techniques , 2015, 2015 International Conference on Advanced Computer Science and Information Systems (ICACSIS).
[177] Helen Partridge,et al. Citizens and social media in times of natural disaster: exploring information experience , 2015, Inf. Res..
[178] Victor C. M. Leung,et al. Developing IoT applications in the Fog: A Distributed Dataflow approach , 2015, 2015 5th International Conference on the Internet of Things (IOT).
[179] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[180] Inderveer Chana,et al. Q-aware: Quality of service based cloud resource provisioning , 2015, Comput. Electr. Eng..
[181] Hilary I. Okagbue,et al. On Some Suggested Applications of Sudoku in Information Systems Security , 2015 .
[182] Qi Shi,et al. Big Data applications in real-time traffic operation and safety monitoring and improvement on urban expressways , 2015 .
[183] Samir Bourekkache,et al. An agent-based approach for resource allocation in the cloud computing environment , 2015, 2015 9th International Conference on Telecommunication Systems Services and Applications (TSSA).
[184] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[185] Hee Beng Kuan Tan,et al. Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[186] Maysam F. Abbod,et al. Automatic generation of fuzzy classification rules using granulation-based adaptive clustering , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.
[187] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[188] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[189] Elisa Bertino. Data privacy for IoT systems: Concepts, approaches, and research directions , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[190] Lin Shao,et al. Hand movement and gesture recognition using Leap Motion Controller , 2016 .
[191] Mariko Nakano-Miyatake,et al. Security attack prediction based on user sentiment analysis of Twitter data , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).
[192] Mariano Ceccato,et al. Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks , 2016, SPRO@CCS.
[193] Archana Ghotkar,et al. Hand Gesture Recognition Using Leap Motion Controller , 2016 .
[194] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[195] Khawaja M. Asim,et al. Earthquake magnitude prediction in Hindukush region using machine learning techniques , 2016, Natural Hazards.
[196] Audrey A. Gendreau,et al. Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[197] G. Bell,et al. The ghosts of selection past reduces the probability of plastic rescue but increases the likelihood of evolutionary rescue to novel stressors in experimental populations of wild yeast. , 2016, Ecology letters.
[198] Yi Shen,et al. Energy-balanced compressive data gathering in Wireless Sensor Networks , 2016, J. Netw. Comput. Appl..
[199] Carlos Sánchez-Azqueta,et al. Secure communication system based on a logistic map and a linear feedback shift register , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[200] Sarat Saharia,et al. A two-level classification scheme for single-hand gestures of Sattriya dance , 2016, 2016 International Conference on Accessibility to Digital World (ICADW).
[201] Philipp Leitner,et al. Resource Provisioning for IoT Services in the Fog , 2016, 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA).
[202] Erdogan Dogdu,et al. An extended IoT framework with semantics, big data, and analytics , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[203] Asif Gill,et al. Towards an IoT Big Data Analytics Framework: Smart Buildings Systems , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[204] Khaled Ben Letaief,et al. Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.
[205] M. Anusha,et al. Big Data-Survey , 2016 .
[206] Marian B. Gorzalczany,et al. A multi-objective genetic optimization for fast, fuzzy rule-based credit classification with balanced accuracy and interpretability , 2016, Appl. Soft Comput..
[207] Devis Bianchini,et al. Big Data As A Service For Monitoring Cyber-Physical Production Systems , 2016, ECMS.
[208] Melannie B. Mendoza,et al. Development of microcontroller-based landslide early warning system , 2016, 2016 IEEE Region 10 Conference (TENCON).
[209] Thomas Kunz,et al. Performance evaluation of IoT protocols under a constrained wireless access network , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).
[210] R. Holt,et al. Evolutionary rescue in novel environments: towards improving predictability , 2016 .
[211] Muhammad Haroon Yousaf,et al. Computer vision based detection and localization of potholes in asphalt pavement images , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[212] Chee Peng Lim,et al. A hybrid model of fuzzy ARTMAP and genetic algorithm for data classification and rule extraction , 2016, Expert Syst. Appl..
[213] Ionel Staretu,et al. Leap Motion Device Used to Control a Real Anthropomorphic Gripper , 2016 .
[214] A. Jawahar,et al. Smart agro system using wireless sensor networks , 2017, 2017 International Conference on Intelligent Computing and Control Systems (ICICCS).
[215] S. M. Chari,et al. Development of Smart Network Using WSN and IoT for Precision Agriculture Monitoring System on Cloud , 2017 .
[216] J. Manafian,et al. Exact solutions for Fitzhugh–Nagumo model of nerve excitation via Kudryashov method , 2017 .
[217] Shigeru Takayama,et al. Detection of landslide disaster by telemetric sensing node network system , 2017, 2017 11th Asian Control Conference (ASCC).
[218] Dumitru Baleanu,et al. A new numerical algorithm for fractional Fitzhugh–Nagumo equation arising in transmission of nerve impulses , 2017 .
[219] Juanru Li,et al. Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices , 2017, 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME).
[220] Sei-Wang Chen,et al. A Novel Distance Estimation Method Leading a Forward Collision Avoidance Assist System for Vehicles on Highways , 2017, IEEE Transactions on Intelligent Transportation Systems.
[221] Alexander Pretschner,et al. Detecting Patching of Executables without System Calls , 2017, CODASPY.
[222] Alexander Ling,et al. Progress in satellite quantum key distribution , 2017, 1707.03613.
[223] Arshad Jhumka,et al. Many-to-many data aggregation scheduling in wireless sensor networks with two sinks , 2017, Comput. Networks.
[224] Yee Kit Chan,et al. A ground-based synthetic aperture radar system using portable VNA for landslide monitoring , 2017, 2017 International Symposium on Antennas and Propagation (ISAP).
[225] Maurice Dawson,et al. Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance , 2017 .
[226] Rudolf Scitovski,et al. Temporal analysis of croatian seismogenic zones to improve earthquake magnitude prediction , 2017, Earth Science Informatics.
[227] Yanmei Kang,et al. A Research on the IOT Perception Environment Security and Privacy Protection Technology , 2017 .
[228] Krishna Subramanian,et al. Opinion Mining Using Twitter Feeds for Political Analysis , 2017 .
[229] Mohammad Zulkernine,et al. Defending Application Cache Integrity of Android Runtime , 2017, ISPEC.
[230] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[231] Peng Li,et al. A Novel Visual Cryptography Scheme with Different Importance of Shadows , 2017, IWDW.
[232] Davide Magrin,et al. Performance evaluation of LoRa networks in a smart city scenario , 2017, 2017 IEEE International Conference on Communications (ICC).
[233] Suhang Wang,et al. Fake News Detection on Social Media: A Data Mining Perspective , 2017, SKDD.
[234] Andri Riid,et al. Design of Fuzzy Rule-based Classifiers through Granulation and Consolidation , 2017, J. Artif. Intell. Soft Comput. Res..
[235] Chun Yang,et al. A Hybrid Multi-level Mechanism for Application Integrity Checking , 2017 .
[236] Oliver Lemon,et al. Challenging Neural Dialogue Models with Natural Data: Memory Networks Fail on Incremental Phenomena , 2017, ArXiv.
[237] Saylee Gharge,et al. Review on Various Visual Cryptography Schemes , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).
[238] Aaron C. Courville,et al. Improved Training of Wasserstein GANs , 2017, NIPS.
[239] H. Stone,et al. Spatial gene drives and pushed genetic waves , 2017, Proceedings of the National Academy of Sciences.
[240] Kristoko Dwi Hartomo,et al. Spatial Model Design of Landslide Vulnerability Early Detection with Exponential Smoothing Method Using Google API , 2017, 2017 International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT).
[241] Tamara Radivilova,et al. Detecting cyber threats through social network analysis: short survey , 2018, ArXiv.
[242] Musheer Ahmad,et al. A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation , 2018, SSCC.
[243] Vinitkumar K. Modi,et al. Review of Taguchi Method, Design of Experiment (DOE) & Analysis Of Variance (ANOVA) For Quality Improvements through Optimization in Foundry , 2018 .
[244] Rakhee,et al. Energy Efficiency in Load Balancing of Nodes Using Soft Computing Approach in WBAN , 2018, Harmony Search and Nature Inspired Optimization Algorithms.
[245] Arif I. Sarwat,et al. Review of Cyber-Physical Attacks and Counter Defense Mechanisms for Advanced Metering Infrastructure in Smart Grid , 2018, 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D).
[246] Francisco Martínez-Álvarez,et al. Seismic indicators based earthquake predictor system using Genetic Programming and AdaBoost classification , 2018, Soil Dynamics and Earthquake Engineering.
[247] Philippe Bolon,et al. A Fast and Accurate Rule-Base Generation Method for Mamdani Fuzzy Systems , 2018, IEEE Transactions on Fuzzy Systems.
[248] Hao Wang,et al. Position based cryptography with location privacy: A step for Fog Computing , 2018, Future Gener. Comput. Syst..
[249] Reuben Varghese,et al. Affordable Smart Farming Using IoT and Machine Learning , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).
[250] Farzad Kiani,et al. Wireless Sensor Network and Internet of Things in Precision Agriculture , 2018 .
[251] Andreas Schütze,et al. Sensors 4.0 – smart sensors and measurement technology enable Industry 4.0 , 2018 .
[252] Héctor M. Pérez Meana,et al. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization , 2018, Sensors.
[253] Inès Kammoun,et al. Redundancy Elimination for Data Aggregation in Wireless Sensor Networks , 2018, 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD).
[254] Teresa Nicole Brooks,et al. Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems , 2017, Advances in Intelligent Systems and Computing.
[255] Sarbani Roy,et al. Social Network Analysis of Cricket Community Using a Composite Distributed Framework: From Implementation Viewpoint , 2018, IEEE Transactions on Computational Social Systems.
[256] Li Da Xu,et al. Industry 4.0: state of the art and future trends , 2018, Int. J. Prod. Res..
[257] Irfan Uddin,et al. Reliable and Energy Efficient MAC Mechanism for Patient Monitoring in Hospitals , 2018 .
[258] Filippo Scotti,et al. Photonics-Based Dual-Band Radar for Landslides Monitoring in Presence of Multiple Scatterers , 2018, Journal of Lightwave Technology.
[259] Cheol-Ho Hong,et al. qCon: QoS-Aware Network Resource Management for Fog Computing , 2018, Sensors.
[260] Approaches of Earthquake Magnitude Prediction Using Machine Learning Techniques , 2018 .
[261] Munir Ahmad,et al. Rainfall Prediction using Data Mining Techniques: A Systematic Literature Review , 2018 .
[262] Kristina Lerman,et al. Predicting Cyber Events by Leveraging Hacker Sentiment , 2018, Inf..
[263] Mohana,et al. Real Time Object Detection and Tracking Using Deep Learning and OpenCV , 2018, 2018 International Conference on Inventive Research in Computing Applications (ICIRCA).
[264] Rajesh Kumar,et al. Fog computing: from architecture to edge computing and big data processing , 2018, The Journal of Supercomputing.
[265] Jangwoo Kwon,et al. Detection of Potholes Using a Deep Convolutional Neural Network , 2018, J. Univers. Comput. Sci..
[266] Mario Muñoz Organero,et al. Automatic detection of traffic lights, street crossings and urban roundabouts combining outlier detection and deep learning classification techniques based on GPS traces while driving , 2018, Comput. Environ. Urban Syst..
[267] Satoshi Tamura,et al. A Deep Learning-Based Approach for Road Pothole Detection in Timor Leste , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).
[268] Jian Yu,et al. A Brief Survey on IoT Privacy: Taxonomy, Issues and Future Trends , 2018, ICSOC Workshops.
[269] Dhruba Kumar Bhattacharyya,et al. A Dataset of Single-Hand Gestures of Sattriya Dance , 2018, Heritage Preservation.
[270] Praveen Kumar Mishra,et al. Landslide Monitoring System Implementing IOT Using Video Camera , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).
[271] Francisco Martínez-Álvarez,et al. Earthquake prediction model using support vector regressor and hybrid neural networks , 2018, PloS one.
[272] Bruno Volckaert,et al. Towards Dynamic Fog Resource Provisioning for Smart City Applications , 2018, 2018 14th International Conference on Network and Service Management (CNSM).
[273] Prashant M. Ambad,et al. Industry 4.0 – A Glimpse , 2018 .
[274] Wenzhong Shi,et al. Landslide Inventory Mapping From Bitemporal High-Resolution Remote Sensing Images Using Change Detection and Multiscale Segmentation , 2018, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[275] Huan Liu,et al. Understanding Cyber Attack Behaviors with Sentiment Information on Social Media , 2018, SBP-BRiMS.
[276] Asif Ekbal,et al. IARM: Inter-Aspect Relation Modeling with Memory Networks in Aspect-Based Sentiment Analysis , 2018, EMNLP.
[277] Jari-Matti Mäkelä,et al. Diversification and obfuscation techniques for software security: A systematic literature review , 2018, Inf. Softw. Technol..
[278] Himadri Tanaya Chidananda,et al. Personalized Movie Recommendation System Using Twitter Data , 2018 .
[279] Jitendra Kumar,et al. Adaptive MAC Protocol in Wireless Sensor Networks for Disaster Detection , 2018 .
[280] S. Galea,et al. Spatio-Temporal Distribution of Negative Emotions in New York City After a Natural Disaster as Seen in Social Media , 2018, International journal of environmental research and public health.
[281] G. S. Nagaraja,et al. Security Architecture for IoT-Based Home Automation , 2019, Smart Intelligent Computing and Applications.
[282] Jae-Yong Ko,et al. Real-time Mandatory Access Control on SELinux for Internet of Things , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[283] Ishaan Lodha,et al. Secure Wireless Internet of Things Communication using Virtual Private Networks , 2019, ArXiv.
[284] Stratis Kanarachos,et al. The Correlation between Vehicle Vertical Dynamics and Deep Learning-Based Visual Target State Estimation: A Sensitivity Study , 2019, Sensors.
[285] Guru Venkataramani,et al. Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study , 2019, IEEE Access.
[286] Guojun Wang,et al. A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking , 2019, Comput. Secur..
[287] Chandan Giri,et al. A Statistical Model to Determine the Behavior Adoption in Different Timestamps on Online Social Network , 2019, Int. J. Knowl. Syst. Sci..
[288] Jong Bae Kim,et al. Efficient Vehicle Detection and Distance Estimation Based on Aggregated Channel Features and Inverse Perspective Mapping from a Single Camera , 2019, Symmetry.
[289] Dongmahn Seo,et al. Experiment of Image Processing Algorithm for Efficient Pothole Detection , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[290] Lida Xu,et al. Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..
[291] Xiaodong Bai,et al. A Low-Cost Internet of Things-Based Home Security System Using Computer Vision , 2020 .
[292] Ramesh Bhakthavatchalu,et al. Reseeding LFSR for Test Pattern Generation , 2019, 2019 International Conference on Communication and Signal Processing (ICCSP).
[293] Luca De Nardis,et al. ThingsLocate: A ThingSpeak-Based Indoor Positioning Platform for Academic Research on Location-Aware Internet of Things , 2019, Technologies.
[294] Jian Wang,et al. Learning Binary Representation for Automatic Patch Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[295] Anubha Parashar,et al. IoT Based Automated Weather Report Generation and Prediction Using Machine Learning , 2019, 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT).
[296] Biswajeet Pradhan,et al. Landslide Detection Using Residual Networks and the Fusion of Spectral and Topographic Information , 2019, IEEE Access.
[297] Aleksandra Gawlik,et al. Solitary Wave Dynamics Governed by the Modified FitzHugh–Nagumo Equation , 2019, Journal of Computational and Nonlinear Dynamics.
[298] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[299] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[300] Jayendra Kumar,et al. Automatic Plant Watering and Monitoring System using NodeMCU , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[301] Pooja Krishnan,et al. Intelligent Border Security Intrusion Detection using IoT and Embedded systems , 2019, 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC).
[302] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[303] Phuong Hoai Ha,et al. Advanced GTS Scheduling in IEEE 802.15.4 Networks for Industrial Application , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[304] Josep Domingo-Ferrer,et al. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..
[305] Victor C. M. Leung,et al. Optimizing Content Dissemination for Real-Time Traffic Management in Large-Scale Internet of Vehicle Systems , 2019, IEEE Transactions on Vehicular Technology.
[306] Nikos Fotiou,et al. Improving the Privacy of IoT with Decentralised Identifiers (DIDs) , 2019, J. Comput. Networks Commun..
[307] Sanjeev Kumar,et al. Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack , 2019, 2019 2nd International Conference on Data Intelligence and Security (ICDIS).
[308] Abdellatif Kobbane,et al. A Resources Representation for Resource Allocation in Fog Computing Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[309] Feng Shu,et al. Novel Modbus Adaptation Method for IoT Gateway , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
[310] Gautam Srivastava,et al. A Privacy-Enhancing Framework for Internet of Things Services , 2019, NSS.
[311] Y. Khan. A variational approach for novel solitary solutions of FitzHugh–Nagumo equation arising in the nonlinear reaction–diffusion equation , 2020 .
[312] T. Ravi,et al. Cluster Based Data Aggregation Scheme for Latency and Packet Loss Reduction in WSN , 2020, Comput. Commun..
[313] C. P. Katti,et al. Security architectures in wireless sensor network , 2020 .
[314] Rui Zhang,et al. Vehicle Detection and Ranging Using Two Different Focal Length Cameras , 2020, J. Sensors.
[315] Abdellatif Hamdoun,et al. Distance measurement system for autonomous vehicles using stereo camera , 2020, Array.
[316] Ali Hassan,et al. Real-time vehicle distance estimation using single view geometry , 2020, 2020 IEEE Winter Conference on Applications of Computer Vision (WACV).
[317] R. Santhana Krishnan,et al. Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks , 2019, Wireless Networks.
[318] Philip James,et al. ACCURATE VEHICLE SPEED ESTIMATION FROM MONOCULAR CAMERA FOOTAGE , 2020 .
[319] J. Van Dyken,et al. Evolutionary Rescue from a Wave of Biological Invasion , 2020, The American Naturalist.
[320] Fadi Al-Turjman,et al. Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling technologies - an overview , 2020, Sustainable Cities and Society.
[321] Guisheng Fan,et al. Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture , 2020, Peer-to-Peer Netw. Appl..
[322] Bhaskaran Raman,et al. RoadCare: A Deep-learning Based Approach to Quantifying Road Surface Quality , 2020, COMPASS.
[323] Gang Mei,et al. A Survey of Internet of Things (IoT) for Geohazard Prevention: Applications, Technologies, and Challenges , 2020, IEEE Internet of Things Journal.
[324] Soumik Ghosh,et al. Priority Based GTS Allocation in Zigbee Wireless Sensor Network , 2020, Communications in Computer and Information Science.
[325] Thar Baker,et al. A secure fog‐based platform for SCADA‐based IoT critical infrastructure , 2020, Softw. Pract. Exp..
[326] Aleksandra Gawlik,et al. Existence of the solitary wave solutions supported by the modified FitzHugh–Nagumo system , 2020, Nonlinear Analysis: Modelling and Control.
[327] Tong Li,et al. Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification , 2020, Inf. Sci..
[328] Bahar Farahani,et al. Towards collaborative intelligent IoT eHealth: From device to fog, and cloud , 2020, Microprocess. Microsystems.
[329] Hanshen Chen,et al. Pothole detection using location-aware convolutional neural networks , 2020, International Journal of Machine Learning and Cybernetics.
[330] Xiaolong Xu,et al. Intelligent Offloading for Collaborative Smart City Services in Edge Computing , 2020, IEEE Internet of Things Journal.
[331] Henrich C. Pöhls,et al. Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications , 2020, 2020 Global Internet of Things Summit (GIoTS).
[332] Guojun Wang,et al. An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City , 2020, Comput. Electr. Eng..
[333] Maryam Shoaran,et al. Single–camera vehicle speed measurement using the geometry of the imaging system , 2020, Multimedia Tools and Applications.
[334] Thar Baker,et al. A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services , 2020, IEEE Transactions on Industrial Informatics.
[335] Richardson Santiago Teles de Menezes,et al. Vehicle Speed Detection and Safety Distance Estimation Using Aerial Images of Brazilian Highways , 2020 .
[336] Pierfrancesco Bellini,et al. Smart City IoT Platform Respecting GDPR Privacy and Security Aspects , 2020, IEEE Access.
[337] B. Muthukumar,et al. A Model for Low Power, High Speed and Energy Efficient Early Landslide Detection System Using IoT , 2019, Wireless Personal Communications.
[338] Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls , .