2024
General construction of efficient circular partially strongly-balanced repeated measurements designs.
Commun. Stat. Simul. Comput., May, 2024
A robust Internet of Drones security surveillance communication network based on IOTA.
Internet Things, April, 2024
A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy.
Inf. Sci., January, 2024
2023
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning.
Future Gener. Comput. Syst., December, 2023
Construction of minimal circular nearly strongly balanced repeated measurements designs and their conversion.
Commun. Stat. Simul. Comput., December, 2023
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023
Preparing quantum many-body scar states on quantum computers.
Quantum, November, 2023
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs.
Comput. Networks, November, 2023
Fuzz-classification (<i>p</i>, <i>l</i>)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches.
Digit. Commun. Networks, October, 2023
Data Provenance in Healthcare: Approaches, Challenges, and Future Directions.
Sensors, July, 2023
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home.
Digit. Commun. Networks, April, 2023
Improved angelization technique against background knowledge attack for 1:M microdata.
PeerJ Comput. Sci., 2023
Using CycleGANs to Generate Realistic STEM Images for Machine Learning.
CoRR, 2023
2022
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework.
Int. J. Intell. Syst., December, 2022
<i>Deep-Confidentiality</i>: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data.
ACM Trans. Internet Techn., 2022
Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain.
IEEE Trans. Ind. Informatics, 2022
DeepCPPred: A Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022
A context-aware information-based clone node attack detection scheme in Internet of Things.
J. Netw. Comput. Appl., 2022
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022
BCALS: Blockchain-based secure log management system for cloud computing.
Trans. Emerg. Telecommun. Technol., 2022
Leveraging Industry 4.0 - Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System.
CoRR, 2022
A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks.
IEEE Access, 2022
2021
Lucy With Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021
Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs.
Sensors, 2021
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.
Sensors, 2021
VisTAS: blockchain-based visible and trusted remote authentication system.
PeerJ Comput. Sci., 2021
A semantic rule based digital fraud detection.
PeerJ Comput. Sci., 2021
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions.
IEEE Internet Things J., 2021
Adaptive and survivable trust management for Internet of Things systems.
IET Inf. Secur., 2021
Privacy-preserving multilevel obfuscation scheme for vehicular network.
Trans. Emerg. Telecommun. Technol., 2021
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets.
Trans. Emerg. Telecommun. Technol., 2021
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud.
Comput. Stand. Interfaces, 2021
Blockchain-based secure multi-resource trading model for smart marketplace.
Computing, 2021
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes.
Comput. Secur., 2021
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities.
Clust. Comput., 2021
Corrigendum to "Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" [Comput. Ind. 123 (December) (2020) 103334].
Comput. Ind., 2021
An intelligent framework to predict socioeconomic impacts of COVID-19 and public sentiments.
Comput. Electr. Eng., 2021
Fog-enabled secure multiparty computation based aggregation scheme in smart grid.
Comput. Electr. Eng., 2021
URL filtering using big data analytics in 5G networks.
Comput. Electr. Eng., 2021
Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
2020
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.
Wirel. Commun. Mob. Comput., 2020
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach.
IEEE Trans. Engineering Management, 2020
Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020
Watermarking as a service (WaaS) with anonymity.
Multim. Tools Appl., 2020
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain.
Multim. Tools Appl., 2020
OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment.
Multim. Tools Appl., 2020
WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger.
Inf. Sci., 2020
FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network.
IEEE Internet Things J., 2020
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Int. J. Parallel Program., 2020
Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers.
Future Gener. Comput. Syst., 2020
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
CoRR, 2020
Provenance-enabled packet path tracing in the RPL-based internet of things.
Comput. Networks, 2020
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space.
Comput. Ind., 2020
Post-quantum distributed ledger for internet of things.
Comput. Electr. Eng., 2020
New algorithms for parameter reduction of intuitionistic fuzzy soft sets.
Comput. Appl. Math., 2020
VANET-Based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles.
IEEE Access, 2020
2019
An improved algorithm for normal parameter reduction of soft set.
J. Intell. Fuzzy Syst., 2019
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019
Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud.
Int. J. Distributed Sens. Networks, 2019
Privacy aware decentralized access control system.
Future Gener. Comput. Syst., 2019
Construction of circular partially balanced-Repeated measurement designs using cyclic shifts.
Commun. Stat. Simul. Comput., 2019
Orchestrating Product Provenance Story: When IOTA ECOSYSTEM Meets The Electronics Supply Chain Space.
CoRR, 2019
An efficient privacy preserving protocol for dynamic continuous data collection.
Comput. Secur., 2019
Order preserving secure provenance scheme for distributed networks.
Comput. Secur., 2019
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions.
Comput. Networks, 2019
A Novel Approach to Parameter Reduction of Fuzzy Soft Set.
IEEE Access, 2019
Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019
2018
Towards ontology-based multilingual URL filtering: a big data problem.
J. Supercomput., 2018
Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges.
J. Netw. Comput. Appl., 2018
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018
Structures and data preserving homomorphic signatures.
J. Netw. Comput. Appl., 2018
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks.
Future Gener. Comput. Syst., 2018
Secure policy execution using reusable garbled circuit in the cloud.
Future Gener. Comput. Syst., 2018
Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things.
CoRR, 2018
Secure provenance using an authenticated data structure approach.
Comput. Secur., 2018
An efficient privacy mechanism for electronic health records.
Comput. Secur., 2018
RALBA: a computation-aware load balancing scheduler for cloud computing.
Clust. Comput., 2018
Detection of rank attack in routing protocol for Low Power and Lossy Networks.
Ann. des Télécommunications, 2018
Improved Generalization for Secure Data Publishing.
IEEE Access, 2018
A Fault Tolerant Approach for Malicious URL Filtering.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018
Data trustworthiness in IoT.
Proceedings of the 2018 International Conference on Information Networking, 2018
2017
Congestion Detection and Alleviation in Multihop Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017
Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017
Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.
J. Sensors, 2017
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes.
J. Netw. Comput. Appl., 2017
Region based cooperative routing in underwater wireless sensor networks.
J. Netw. Comput. Appl., 2017
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017
τ-safety: A privacy model for sequential publication with arbitrary updates.
Comput. Secur., 2017
A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017
Towards a set aggregation-based data integrity scheme for smart grids.
Ann. des Télécommunications, 2017
Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017
Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development.
IEEE Access, 2017
A trust management system model for cloud.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017
Secure Logging as a Service Using Reversible Watermarking.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017
2016
Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks.
J. Sensors, 2016
Buyer seller watermarking protocols issues and challenges - A survey.
J. Netw. Comput. Appl., 2016
A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs.
KSII Trans. Internet Inf. Syst., 2016
Adaptive Reputation Weights Assignment Scheme for MANETs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Aggregated Signatures for Chaining: A Secure Provenance Scheme.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Introducing Secure Provenance in IoT: Requirements and Challenges.
Proceedings of the 2016 International Workshop on Secure Internet of Things, 2016
A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Secure login protocols: An analysis on modern attacks and solutions.
Proceedings of the 22nd International Conference on Automation and Computing, 2016
2013
Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols.
CoRR, 2013
Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols.
CoRR, 2013
Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs.
CoRR, 2013
REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
2010
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop.
Proceedings of the ARES 2010, 2010
2009
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).
Proceedings of the Advances in Information Security and Assurance, 2009
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks.
Proceedings of the FIT '09, 2009
Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks.
Proceedings of the FIT '09, 2009
Mobile agent watermarking (MAW): security properties and attacks revisited.
Proceedings of the FIT '09, 2009
2008
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE).
Proceedings of the IEEE International Conference on Systems, 2008
2007
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
A Novel Method of Watermarking Relational Databases using Character String.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006
1997
Design and implementation of a software bridge with packet filtering and statistics collection functions.
Int. J. Netw. Manag., 1997