IEEE Open Journal of the Computer Society, Vol. 1, 2020
PAPERS
1. A Simulation Study of the Measurement of Queueing Delay Over End-to-End Paths. --K. Salehin, K. W. Kwon, and R. Rojas-Cessa.
2. Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments. --D.-C. Wu and Y.-M. Wu.
3. Analyzing CSP Trustworthiness and Predicting Cloud Service Performance. --R. Maeser.
4. XBlock-ETH: Extracting and Exploring Blockchain Data From Ethereum. --P. Zheng, Z. Zheng, J. Wu, and H.-N. Dai.
5. An Instrument for Remote Kissing and Engineering Measurement of Its Communication Effects Including Modified Turing Test. --A. D. Cheok.
6. Fuzzy Logic-Based Adaptive Point Cloud Video Streaming. --Z. Liu, J. Li, X. Chen, C. Wu, S. Ishihara, Y. Ji, and J. Li.
7. Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage. --J.-D. Wu, Y.-M. Tseng, S.-S. Huang, and T.-T. Tsai.
8. SPQER: Speech Quality Evaluation Using Word Recognition for VoIP Communication in Lossy and Mobile Networks. --B. Schuetz and N. Aschenbruck.
9. Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures. --S. Bagchi, V. Aggarwal, S. Chaterji, F. Douglis, A. E. Gamal, J. Han, B. J. Henz, H. Hoffmann, S. Jana, M. Kulkarni, F. X. Lin, K. Marais, P. Mittal, S. Mou, X. Qiu, and G. Scutari.
10. LD-Net: An Efficient Lightweight Denoising Model Based on Convolutional Neural Network. --T.-H. Le, P.-H. Lin, and S.-C. Huang.
11. How Blockchain Enhances Supply Chain Management: A Survey. --D. Shakhbulatov, J. Medina, Z. Dong, and R. Rojas-Cessa.
12. Hierarchical Pooling Strategy Optimization for Accelerating Asymptomatic COVID-19 Screening. --K. Li.
SPECIAL SECTION PAPERS
5G-Envisioned Internet of Things
1. Personalized Federated Learning for Intelligent IoT Applications: A Cloud-Edge Based Framework. --Q. Wu, K. He, and X. Chen.
2. Federated Learning for Vehicular Internet of Things: Recent Advances and Open Issues. --Z. Du, C. Wu, T. Yoshinaga, K.-L. A. Yau, Y. Ji, and J. Li.
3. FedVision: Federated Video Analytics With Edge Computing. --Y. Deng, T. Han, and N. Ansari.
Artificial Intelligence and Machine Learning for Future Networking
1. Network Resource Allocation Strategy Based on Deep Reinforcement Learning. --S. Zhang, C. Wang, J. Zhang, Y. Duan, X. You, and P. Zhang.
2. Self-Optimizing Optical Network With Cloud-Edge Collaboration: Architecture and Application. --Z. Li, Y. Zhao, Y. Li, M. Liu, Z. Zeng, X. Xin, F. Wang, X. Li, and J. Zhang.
Blockchain Intelligence: Technologies and Applications
1. Trace-Based Dynamic Gas Estimation of Loops in Smart Contracts. --C. Li, S. Nie, Y. Cao, Y. Yu, and Z. Hu.
Cybersecurity: Privacy, Attack, and Defense
1. A Secure Communication System in Self-Organizing Networks via Lightweight Group Key Generation. --S. Peng, B. Han, C. Wu, and B. Wang.
2. Concatenated Graph Coding on Bandwidth Part for Secure Pilot Authentication in Grant-Free URLLC. --D. Xu and P. Ren.
3. Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic. --S. Yang, J. Jiang, A. Pal, K. Yu, F. Chen, and S. Yu.
4. Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems. --B. Li, Y. Xiao, Y. Shi, Q. Kong, Y. Wu, and H. Bao.
5. Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. --T.-L. Wan, T. Ban, S.-M. Cheng, Y.-T. Lee, B. Sun, R. Isawa, T. Takahashi, and D. Inoue.
6. Etoram: A More Efficient ORAM for Secure Computation. --Z. Chen, B. Zhao, H. Lin, and L. Chen.
1. A Simulation Study of the Measurement of Queueing Delay Over End-to-End Paths. --K. Salehin, K. W. Kwon, and R. Rojas-Cessa.
2. Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments. --D.-C. Wu and Y.-M. Wu.
3. Analyzing CSP Trustworthiness and Predicting Cloud Service Performance. --R. Maeser.
4. XBlock-ETH: Extracting and Exploring Blockchain Data From Ethereum. --P. Zheng, Z. Zheng, J. Wu, and H.-N. Dai.
5. An Instrument for Remote Kissing and Engineering Measurement of Its Communication Effects Including Modified Turing Test. --A. D. Cheok.
6. Fuzzy Logic-Based Adaptive Point Cloud Video Streaming. --Z. Liu, J. Li, X. Chen, C. Wu, S. Ishihara, Y. Ji, and J. Li.
7. Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage. --J.-D. Wu, Y.-M. Tseng, S.-S. Huang, and T.-T. Tsai.
8. SPQER: Speech Quality Evaluation Using Word Recognition for VoIP Communication in Lossy and Mobile Networks. --B. Schuetz and N. Aschenbruck.
9. Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures. --S. Bagchi, V. Aggarwal, S. Chaterji, F. Douglis, A. E. Gamal, J. Han, B. J. Henz, H. Hoffmann, S. Jana, M. Kulkarni, F. X. Lin, K. Marais, P. Mittal, S. Mou, X. Qiu, and G. Scutari.
10. LD-Net: An Efficient Lightweight Denoising Model Based on Convolutional Neural Network. --T.-H. Le, P.-H. Lin, and S.-C. Huang.
11. How Blockchain Enhances Supply Chain Management: A Survey. --D. Shakhbulatov, J. Medina, Z. Dong, and R. Rojas-Cessa.
12. Hierarchical Pooling Strategy Optimization for Accelerating Asymptomatic COVID-19 Screening. --K. Li.
SPECIAL SECTION PAPERS
5G-Envisioned Internet of Things
1. Personalized Federated Learning for Intelligent IoT Applications: A Cloud-Edge Based Framework. --Q. Wu, K. He, and X. Chen.
2. Federated Learning for Vehicular Internet of Things: Recent Advances and Open Issues. --Z. Du, C. Wu, T. Yoshinaga, K.-L. A. Yau, Y. Ji, and J. Li.
3. FedVision: Federated Video Analytics With Edge Computing. --Y. Deng, T. Han, and N. Ansari.
Artificial Intelligence and Machine Learning for Future Networking
1. Network Resource Allocation Strategy Based on Deep Reinforcement Learning. --S. Zhang, C. Wang, J. Zhang, Y. Duan, X. You, and P. Zhang.
2. Self-Optimizing Optical Network With Cloud-Edge Collaboration: Architecture and Application. --Z. Li, Y. Zhao, Y. Li, M. Liu, Z. Zeng, X. Xin, F. Wang, X. Li, and J. Zhang.
Blockchain Intelligence: Technologies and Applications
1. Trace-Based Dynamic Gas Estimation of Loops in Smart Contracts. --C. Li, S. Nie, Y. Cao, Y. Yu, and Z. Hu.
Cybersecurity: Privacy, Attack, and Defense
1. A Secure Communication System in Self-Organizing Networks via Lightweight Group Key Generation. --S. Peng, B. Han, C. Wu, and B. Wang.
2. Concatenated Graph Coding on Bandwidth Part for Secure Pilot Authentication in Grant-Free URLLC. --D. Xu and P. Ren.
3. Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic. --S. Yang, J. Jiang, A. Pal, K. Yu, F. Chen, and S. Yu.
4. Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems. --B. Li, Y. Xiao, Y. Shi, Q. Kong, Y. Wu, and H. Bao.
5. Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files. --T.-L. Wan, T. Ban, S.-M. Cheng, Y.-T. Lee, B. Sun, R. Isawa, T. Takahashi, and D. Inoue.
6. Etoram: A More Efficient ORAM for Secure Computation. --Z. Chen, B. Zhao, H. Lin, and L. Chen.
Salehin, K. - Personal Name
Maeser, R. - Personal Name
Zheng, P. - Personal Name
Cheok, A. D. - Personal Name
Liu, Z. - Personal Name
Schuetz, B. - Personal Name
Bagchi, S. - Personal Name
Shakhbulatov, D. - Personal Name
Maeser, R. - Personal Name
Zheng, P. - Personal Name
Cheok, A. D. - Personal Name
Liu, Z. - Personal Name
Schuetz, B. - Personal Name
Bagchi, S. - Personal Name
Shakhbulatov, D. - Personal Name
Vol. 1, 2020
2644-1268
e-Journal PTI
Inggris
IEEE Xplore
2020
United States of America
LOADING LIST...
LOADING LIST...