An efficient authentication scheme syncretizing physical unclonable function and revocable biometrics in Industrial Internet of Things.
J. King Saud Univ. Comput. Inf. Sci., 2024
Antecedents and outcomes of artificial intelligence adoption and application in the workplace: the socio-technical system theory perspective.
Inf. Technol. People, 2023
How do remote workers perform during COVID-19 lockdowns? Examining professional isolation, cynicism and psychological hardiness.
Inf. Technol. People, 2023
Trust-based secure directed diffusion routing protocol in WSN.
J. Ambient Intell. Humaniz. Comput., 2022
An anonymous authentication and key agreement protocol in smart living.
Comput. Commun., 2022
BCSE: Blockchain-based trusted service evaluation model over big data.
Big Data Min. Anal., 2022
Video Forensics for Object Removal Based on Darknet3D.
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Shap-PreBiNT: A Sentiment Analysis Model Based on Optimized Transformer.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021
LacminCC: lightweight anonymous communication model in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2021
Network Security Situation Assessment Method Based on MHSA-FL Model.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
A game-theoretic approach of mixing different qualities of coins.
Int. J. Intell. Syst., 2020
Research on Blockchain-Based Identity Authentication Scheme in Social Networks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Self-paced learning based multi-kernel KRR for brain structure analysis in patients with different blood pressure levels.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020
3D Convolutional Networks Based Automatic Diagnosis of Alzheimer's Disease Using Structural MRI.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019
A Security Detection Model for Selfish Mining Attack.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Maximized Traffic Offloading by Content Sharing in D2D Communication.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Data caching policies for device to device within cellular networks.
Proceedings of the 2016 International Conference on Intelligent Information Processing, 2016
A low-complexity differential space-time transmission scheme for large numbers of receive antennas.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005