Most Downloaded Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

A systematic literature review of blockchain cyber security

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through...

Share article

Visible light communication: Applications, architecture, standardization and research challenges

The Radio Frequency (RF) communication suffers from interference and high latency issues. Along with this, RF communication requires a separate setup for transmission and reception of RF waves. Overcoming...

Share article

Machine learning for internet of things data analysis: a survey

Rapid developments in hardware, software, and communication technologies have facilitated the emergence of Internet-connected sensory devices that provide observations and data measurements from the...

Share article

Dynamic defenses in cyber security: Techniques, methods and challenges

Driven by the rapid development of the Internet of Things, cloud computing and other emerging technologies, the connotation of cyberspace is constantly expanding and becoming the fifth dimension of...

Share article

Security and privacy in 6G networks: New areas and new challenges

With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions....

Share article

Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

Over the past years, the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life. However, using machine learning...

Share article

Attacks and defences on intelligent connected vehicles: a survey

Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g.,...

Share article

Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks

In this paper, we survey state-of-the-art research outcomes in the burgeoning field of Reconfigurable Intelligent Surface (RIS), given its potential for significant performance enhancement of next-generation...

Share article

Performance analysis and comparison of PoW, PoS and DAG based blockchains

In the blockchain, the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks. Various blockchain consensus mechanisms have been proposed....

Share article

A survey on deploying mobile deep learning applications: A systemic and technical perspective

With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service...

Share article

Privacy preservation in permissionless blockchain: A survey

Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain...

Share article

Wireless sensing for a solar power system

Wireless sensing is an excellent approach for remotely operated solar power system. Not only being able to get the sensor data, such as voltage, current, and temperature, the system can also have a...

Share article

A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance

Supply Chain Finance (SCF) refers to the financial service in which banks rely on core enterprises to manage the capital flow and logistics of upstream and downstream enterprises. SCF adopts a self-testing...

Share article

Intrusion detection and prevention system for an IoT environment

Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable....

Share article

Research advances on blockchain-as-a-service: architectures, applications and challenges

Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain...

Share article

A survey on deep learning for textual emotion analysis in social networks

Textual Emotion Analysis (TEA) aims to extract and analyze user emotional states in texts. Various Deep Learning (DL) methods have developed rapidly, and they have proven to be successful in many fields...

Share article

A blockchain future for internet of things security: a position paper

Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things,...

Share article

Edge computing technologies for Internet of Things: a primer

With the rapid development of mobile internet and Internet of Things applications, the conventional centralized cloud computing is encountering severe challenges, such as high latency, low Spectral...

Share article

Tracing manufacturing processes using blockchain-based token compositions

Supply chain traceability is one of the most promising use cases to benefit from characteristics of blockchain, such as decentralization, immutability and transparency, not required to build prior trust...

Share article

A review of optimization methods for computation offloading in edge computing networks

Handling the massive amount of data generated by Smart Mobile Devices (SMDs) is a challenging computational problem. Edge Computing is an emerging computation paradigm that is employed to conquer this...

Share article

Sports match prediction model for training and exercise using attention-based LSTM network

Sports matches are very popular all over the world. The prediction of a sports match is helpful to grasp the team's state in time and adjust the strategy in the process of the match. It's a challenging...

Share article

Feature extraction for machine learning-based intrusion detection in IoT networks

A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems (NIDSs). Consequently, network interruptions and loss of...

Share article

A survey on user-centric cell-free massive MIMO systems

The mobile data traffic has been exponentially growing during the last several decades. This was enabled by the densification of the network infrastructure in terms of increased cell density (i.e.,...

Share article

Deep learning for the internet of things: Potential benefits and use-cases

The massive number of sensors deployed in the Internet of Things (IoT) produce gigantic amounts of data for facilitating a wide range of applications. Deep Learning (DL) would undoubtedly play a role...

Share article

Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities

As autonomous vehicles and the other supporting infrastructure (e.g., smart cities and intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) is getting increasingly...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.