Md. Zakirul Alam Bhuiyan

Orcid: 0000-0002-9513-9990

According to our database1, Md. Zakirul Alam Bhuiyan authored at least 243 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cooperative Location-Sensing Network Based on Vehicular Communication Security Against Attacks.
IEEE Trans. Intell. Transp. Syst., January, 2023

C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT.
IEEE Trans. Ind. Informatics, 2023

FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023

Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications.
IEEE Trans. Ind. Informatics, 2023

Unauthorized and privacy-intrusive human activity watching through Wi-Fi signals: An emerging cybersecurity threat.
Concurr. Comput. Pract. Exp., 2023

Anonymous Authentication Scheme for Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Blockchain Topology Optimization Based on Node Clustering.
Proceedings of the IEEE INFOCOM 2023, 2023

Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language Models.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
PSDF: Privacy-aware IoV Service Deployment with Federated Learning in Cloud-Edge Computing.
ACM Trans. Intell. Syst. Technol., 2022

Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserving Federated Depression Detection From Multisource Mobile Health Data.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Based Machine Learning Framework for Edge Services in IIoT.
IEEE Trans. Ind. Informatics, 2022

Privacy-Aware Factorization-Based Hybrid Recommendation Method for Healthcare Services.
IEEE Trans. Ind. Informatics, 2022

Digital Twin-Assisted Real-Time Traffic Data Prediction Method for 5G-Enabled Internet of Vehicles.
IEEE Trans. Ind. Informatics, 2022

AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT.
IEEE Internet Things J., 2022

Blockchain-enabled fraud discovery through abnormal smart contract detection on Ethereum.
Future Gener. Comput. Syst., 2022

Re-ranking with multiple objective optimization in recommender system.
Trans. Emerg. Telecommun. Technol., 2022

Personalised context-aware re-ranking in recommender system.
Connect. Sci., 2022

OCP: an OLAP-based bus crowdedness smart-perceiving mechanism for urban transportation.
Connect. Sci., 2022

On authenticated skyline query processing over road networks.
Concurr. Comput. Pract. Exp., 2022

Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Proceedings of the IEEE International Conference on Trust, 2022

Automatic Smart Contract Generation with Knowledge Extraction and Unified Modeling Language.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

LightSCA: Lightweight Side-Channel Attack via Discrete Cosine Transform and Residual Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

DuRBIN: A Comprehensive Approach to Analysis and Detection of Emerging Threats due to Network Intrusion.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Evolution of IoT-enabled connectivity and applications in automotive industry: A review.
Veh. Commun., 2021

Solving Coupling Security Problem for Sustainable Sensor-Cloud Systems Based on Fog Computing.
IEEE Trans. Sustain. Comput., 2021

Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection.
ACM Trans. Internet Techn., 2021

Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems.
IEEE Trans. Netw. Sci. Eng., 2021

A Deep Learning-Based Mobile Crowdsensing Scheme by Predicting Vehicle Mobility.
IEEE Trans. Intell. Transp. Syst., 2021

Adaptive Computation Offloading With Edge for 5G-Envisioned Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing.
IEEE Trans. Intell. Transp. Syst., 2021

Trust-Aware Service Offloading for Video Surveillance in Edge Computing Enabled Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021

Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
IEEE Trans. Big Data, 2021

Zero shot augmentation learning in internet of biometric things for health signal processing.
Pattern Recognit. Lett., 2021

In-network generalized trustworthy data collection for event detection in cyber-physical systems.
PeerJ Comput. Sci., 2021

Multiagent Deep Reinforcement Learning for Vehicular Computation Offloading in IoT.
IEEE Internet Things J., 2021

Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding.
Future Gener. Comput. Syst., 2021

Editorial for Special Issue on Flexible Cloud and Edge for Internet-of-Things.
Trans. Emerg. Telecommun. Technol., 2021

A reliable deep learning-based algorithm design for IoT load identification in smart grid.
Ad Hoc Networks, 2021

Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Robust Social Event Detection via Deep Clustering.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Semantic Social Event Evolution Discovering.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Message from the DependSys 2021 Steering Chairs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
Privacy Enhanced Location Sharing for Mobile Online Social Networks.
IEEE Trans. Sustain. Comput., 2020

Deep Irregular Convolutional Residual LSTM for Urban Traffic Passenger Flows Prediction.
IEEE Trans. Intell. Transp. Syst., 2020

TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System.
IEEE Trans. Ind. Informatics, 2020

MDMaaS: Medical-Assisted Diagnosis Model as a Service With Artificial Intelligence and Trust.
IEEE Trans. Ind. Informatics, 2020

Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications.
IEEE Trans. Ind. Informatics, 2020

Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020

Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020

Event Detection Through Differential Pattern Mining in Cyber-Physical Systems.
IEEE Trans. Big Data, 2020

<i>TrCMP</i>: A dependable app usage inference design for user behavior analysis through cyber-physical parameters.
J. Syst. Archit., 2020

Automatic blockchain whitepapers analysis via heterogeneous graph neural network.
J. Parallel Distributed Comput., 2020

Preface: Security & privacy in social big data.
J. Parallel Distributed Comput., 2020

IoT for energy efficient green highway lighting systems: Challenges and issues.
J. Netw. Comput. Appl., 2020

Smart world systems, applications, and technologies.
J. Netw. Comput. Appl., 2020

An incentive-based protection and recovery strategy for secure big data in social networks.
Inf. Sci., 2020

Spatial temporal incidence dynamic graph neural networks for traffic flow forecasting.
Inf. Sci., 2020

Joint Optimization of Offloading Utility and Privacy for Edge Computing Enabled IoT.
IEEE Internet Things J., 2020

Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things.
IEEE Internet Things J., 2020

Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020

A Novel Load Balancing and Low Response Delay Framework for Edge-Cloud Network Based on SDN.
IEEE Internet Things J., 2020

Toward Wi-Fi Halow Signal Coverage Modeling in Collapsed Structures.
IEEE Internet Things J., 2020

DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring.
Inf. Fusion, 2020

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

A novel trust mechanism based on Fog Computing in Sensor-Cloud System.
Future Gener. Comput. Syst., 2020

A Semi-Dynamic Bus Routing Infrastructure based on MBTA Bus Data.
CoRR, 2020

Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN).
Comput., 2020

A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication.
Comput., 2020

PROTECTOR: Towards the protection of sensitive data in Europe and the US.
Comput. Networks, 2020

IEEE Access Special Section Editorial: Proximity Service (Prose) Challenges and Applications.
IEEE Access, 2020

A Survey on Behavioral Pattern Mining From Sensor Data in Internet of Things.
IEEE Access, 2020

Towards Recommendation in Internet of Things: An Uncertainty Perspective.
IEEE Access, 2020

Hybrid Deep Neural Networks for Friend Recommendations in Edge Computing Environment.
IEEE Access, 2020

Hierarchical Graph Transformer-Based Deep Learning Model for Large-Scale Multi-Label Text Classification.
IEEE Access, 2020

Security and Privacy Analysis of mhealth Application: A Case Study.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Modelling Attacks in Blockchain Systems using Petri Nets.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities.
Proceedings of the 19th IEEE International Conference on Trust, 2020

HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

2019
A survey on security attacks in VANETs: Communication, applications and challenges.
Veh. Commun., 2019

Sustainable and Efficient Data Collection from WSNs to Cloud.
IEEE Trans. Sustain. Comput., 2019

SPFC: An Effective Optimization for Vertex-Centric Graph Processing Systems.
IEEE Trans. Sustain. Comput., 2019

Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing.
ACM Trans. Sens. Networks, 2019

Dependability in Cyber-Physical Systems and Applications.
ACM Trans. Cyber Phys. Syst., 2019

Ring: Real-Time Emerging Anomaly Monitoring System Over Text Streams.
IEEE Trans. Big Data, 2019

Fuzzy sliding mode control of servo control system based on variable speeding approach rate.
Soft Comput., 2019

Modeling and clustering attacker activities in IoT through machine learning techniques.
Inf. Sci., 2019

Fog-Based Computing and Storage Offloading for Data Synchronization in IoT.
IEEE Internet Things J., 2019

A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing.
IEEE Internet Things J., 2019

Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare.
IEEE Internet Things J., 2019

Review of static risk-based security assessment in power system.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Economic perspective analysis of protecting big data security and privacy.
Future Gener. Comput. Syst., 2019

Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Gener. Comput. Syst., 2019

Wi-Fi frequency selection concept for effective coverage in collapsed structures.
Future Gener. Comput. Syst., 2019

Foreword to the special issue on security, privacy, and social networks.
Concurr. Comput. Pract. Exp., 2019

Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017).
Concurr. Comput. Pract. Exp., 2019

Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library.
IEEE Access, 2019

Interactive Learning Experience-Driven Smart Communications Networks for Cognitive Load Management in Grammar Learning Context.
IEEE Access, 2019

Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures.
IEEE Access, 2019

An Anonymous Protocol for Member Privacy in a Consortium Blockchain.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Ransomware Attack Protection: A Cryptographic Approach.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Energy-Efficient Routing for Greenhouse Monitoring Using Heterogeneous Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future Directions.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Data Reduction through Decision-Making Based on Event-Sensitivity in IoT-Enabled Event Monitoring.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Wi-Fi Signal Analysis for Heartbeat and Metal Detection: A Comparative Study of Reliable Contactless Systems.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Towards Privacy-preserving Recommender System with Blockchains.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Optimal Personalized DDoS Attacks Detection Strategy in Network Systems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

On the Assessment of Security and Performance Bugs in Chromium Open-Source Project.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

IoT Based Hybrid Green Energy Driven Highway Lighting System.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Towards a Privacy-Preserving Voting System Through Blockchain Technologies.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

An Overview of Wearable Computing.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

Mobile Target Tracking with Multiple Objectives in Wireless Sensor Networks.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Nearest neighbor search with locally weighted linear regression for heartbeat classification.
Soft Comput., 2018

Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.
Secur. Commun. Networks, 2018

FluteDB: An efficient and scalable in-memory time series database for sensor-cloud.
J. Parallel Distributed Comput., 2018

HotML: A DSM-based machine learning system for social networks.
J. Comput. Sci., 2018

L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks.
J. Netw. Comput. Appl., 2018

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
IEEE Internet Things J., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Guest Editorial Special Issue on Emerging Social Internet of Things: Recent Advances and Applications.
IEEE Internet Things J., 2018

An effective copyright-protected content delivery scheme for P2P file sharing networks.
Int. J. Commun. Syst., 2018

A connection probability model for communications networks under regional failures.
Int. J. Crit. Infrastructure Prot., 2018

Fog-based storage technology to fight with cyber threat.
Future Gener. Comput. Syst., 2018

Gait-based Human identification using acoustic sensor and deep neural network.
Future Gener. Comput. Syst., 2018

Incremental term representation learning for social network analysis.
Future Gener. Comput. Syst., 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Gener. Comput. Syst., 2018

Acoustic sensor networks in the Internet of Things applications.
Future Gener. Comput. Syst., 2018

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Future Gener. Comput. Syst., 2018

A novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial-temporal data features.
Future Gener. Comput. Syst., 2018

An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018

Improving risk assessment model of cyber security using fuzzy logic inference system.
Comput. Secur., 2018

Energy-efficient relay tracking with multiple mobile camera sensors.
Comput. Networks, 2018

Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring.
IEEE Commun. Mag., 2018

PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Commun. Mag., 2018

Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting.
Ad Hoc Networks, 2018

Reliable Decision Making of Accepting Friend Request on Online Social Networks.
IEEE Access, 2018

Collab-SAR: A Collaborative Avalanche Search-and-Rescue Missions Exploiting Hostile Alpine Networks.
IEEE Access, 2018

A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Deep Convolutional Mesh RNN for Urban Traffic Passenger Flows Prediction.
Proceedings of the 2018 IEEE SmartWorld, 2018

Load Aware Management of Cloudlets for a Wireless Area Metropolitan Network.
Proceedings of the 2018 IEEE SmartWorld, 2018

Graph CNNs for Urban Traffic Passenger Flows Prediction.
Proceedings of the 2018 IEEE SmartWorld, 2018

Towards Wi-Fi Radar in Collapsed Structures.
Proceedings of the 2018 IEEE SmartWorld, 2018

Inspecting Influences on Likes and Comments of Photos in Instagram.
Proceedings of the 2018 IEEE SmartWorld, 2018

Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts.
Proceedings of the 2018 IEEE SmartWorld, 2018

One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

TrCMP: An App Usage Inference Method for Mobile Service Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

CRAB: Blockchain Based Criminal Record Management System.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Cloud Enabled e-Glossary System: A Smart Campus Perspective.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid.
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018

Wi-Fi Radar Placement for Coverage in Collapsed Structures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Blockchain and Big Data to Transform the Healthcare.
Proceedings of the International Conference on Data Processing and Applications, 2018

Performance Evaluation of History-Based and Priority-Based MAC for Traffic-Differentiated Intra-Vehicular Network.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
SafeDrive: Online Driving Anomaly Detection From Large-Scale Vehicle Data.
IEEE Trans. Ind. Informatics, 2017

Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks.
IEEE Trans. Ind. Informatics, 2017

Dependable Structural Health Monitoring Using Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities.
ACM Trans. Cyber Phys. Syst., 2017

e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems.
ACM Trans. Auton. Adapt. Syst., 2017

Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Netw. Comput. Appl., 2017

Privacy-friendly secure bidding for smart grid demand-response.
Inf. Sci., 2017

Special issue on dependability in parallel and distributed systems and applications.
Inf. Sci., 2017

A privacy preserving framework for RFID based healthcare systems.
Future Gener. Comput. Syst., 2017

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurr. Comput. Pract. Exp., 2017

Interoperable localization for mobile group users.
Comput. Commun., 2017

PB-MII: replacing static RSUs with public buses-based mobile intermediary infrastructure in urban VANET-based clouds.
Clust. Comput., 2017

Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017

Naturalistic driving data for a smart cloud-based abnormal driving detector.
Proceedings of the 2017 IEEE SmartWorld, 2017

An FPGA-Based Algorithm to Accelerate Regular Expression Matching.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

RPS-TSM: A Robot Perception System Based on Temporal Semantic Map.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

The Art of Using Cross-Layer Design in Cognitive Radio Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Coupling Reliability Problem in Sensor-Cloud System.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security and Attack Vector Analysis of IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Password Recovery for ZIP Files Based on ARM-FPGA Cluster.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Privacy-Protected Data Collection in Wireless Medical Sensor Networks.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

DPS: A DSM-based Parameter Server for Machine Learning.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

The Strength of Dithering in Recommender System.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Maintaining the Balance between Privacy and Data Integrity in Internet of Things.
Proceedings of the 2017 International Conference on Management Engineering, 2017

Content-Centric Event-Insensitive Big Data Reduction in Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A 3D-Collaborative Wireless Network: Towards Resilient Communication for Rescuing Flood Victims.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A Secure and Dependable Connected Smart Home System for Elderly.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A Survey on Deep Learning in Big Data.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Cooperative relay tracking with multiple mobile camera sensors.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Unsupervised learning of indoor localization based on received signal strength.
Wirel. Commun. Mob. Comput., 2016

Following Targets for Mobile Tracking in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2016

Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring.
IEEE Trans. Ind. Informatics, 2016

Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges.
ACM Comput. Surv., 2016

Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Trustworthy and protected data collection for event detection using networked sensing systems.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Event Detection through Differential Pattern Mining in Internet of Things.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Collusion Attack Detection in Networked Systems.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks.
IEEE Trans. Computers, 2015

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring.
IEEE Trans. Computers, 2015

Energy-efficient healthcare monitoring with smartphones and IoT technologies.
Int. J. High Perform. Comput. Netw., 2015

Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring.
Int. J. Embed. Syst., 2015

Dependable Structural Helath Monitoring Using Wireless Sensor Networks.
CoRR, 2015

Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Resource-Efficient Vibration Data Collection in Cyber-Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Sensor Placement with Multiple Objectives for Structural Health Monitoring.
ACM Trans. Sens. Networks, 2014

Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks.
Future Gener. Comput. Syst., 2014

Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

2013
Local Monitoring and Maintenance for Operational Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

2012
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Fault tolerant WSN-based structural health monitoring.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2010

2009
Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

An Algorithm for Determining Neural Network Architecture Using Differential Evolution.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009


  Loading...