-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
84930338781
-
A vision of IoT: Applications, challenges, and opportunities with China perspective
-
Aug.
-
S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of IoT: Applications, challenges, and opportunities with China perspective, " IEEE Internet Things J., vol. 1, no. 4, pp. 349-359, Aug. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.4
, pp. 349-359
-
-
Chen, S.1
Xu, H.2
Liu, D.3
Hu, B.4
Wang, H.5
-
3
-
-
84958816110
-
Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology
-
Mar.
-
H. Ning, H. Liu, J. Ma, L. T. Yang, and R. Huang, "Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology, " Future Gener. Comput. Syst., vol. 56, pp. 504-522, Mar. 2016.
-
(2016)
Future Gener. Comput. Syst.
, vol.56
, pp. 504-522
-
-
Ning, H.1
Liu, H.2
Ma, J.3
Yang, L.T.4
Huang, R.5
-
4
-
-
85000893446
-
Heterogeneous ad hoc networks: Architectures, advances and challenges
-
Feb.
-
T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, "Heterogeneous ad hoc networks: Architectures, advances and challenges, " Ad Hoc Netw., vol. 55, pp. 143-152, Feb. 2017.
-
(2017)
Ad Hoc Netw.
, vol.55
, pp. 143-152
-
-
Qiu, T.1
Chen, N.2
Li, K.3
Qiao, D.4
Fu, Z.5
-
5
-
-
85049449979
-
-
Hoboken, NJ, USA: Wiley
-
H. Song, R. Srinivasan, T. Sookoor, and S. Jeschke, Smart Cities: Foundations, Principles and Applications. Hoboken, NJ, USA: Wiley, 2017.
-
(2017)
Smart Cities: Foundations, Principles and Applications
-
-
Song, H.1
Srinivasan, R.2
Sookoor, T.3
Jeschke, S.4
-
6
-
-
80053998639
-
Cyber-individual meets brain informatics
-
Sep. /Oct.
-
J. Ma, J. Wen, R. Huang, and B. Huang, "Cyber-individual meets brain informatics, " IEEE Intell. Syst., vol. 26, no. 5, pp. 30-37, Sep. /Oct. 2011.
-
(2011)
IEEE Intell. Syst.
, vol.26
, Issue.5
, pp. 30-37
-
-
Ma, J.1
Wen, J.2
Huang, R.3
Huang, B.4
-
7
-
-
84925882350
-
From the Internet of Things to the Internet of people
-
Mar. /Apr.
-
J. Miranda et al., "From the Internet of Things to the Internet of people, " IEEE Internet Comput., vol. 19, no. 2, pp. 40-47, Mar. /Apr. 2015.
-
(2015)
IEEE Internet Comput.
, vol.19
, Issue.2
, pp. 40-47
-
-
Miranda, J.1
-
8
-
-
84922812202
-
Cyber-physical-social-thinking space based science and technology framework for the Internet of Things
-
H. Ning and H. Liu, "Cyber-physical-social-thinking space based science and technology framework for the Internet of Things, " Sci. China Inf. Sci., vol. 58, no. 3, pp. 1-19, 2015.
-
(2015)
Sci. China Inf. Sci.
, vol.58
, Issue.3
, pp. 1-19
-
-
Ning, H.1
Liu, H.2
-
10
-
-
77957589684
-
Ubiquitous ID: Standards for ubiquitous computing and the Internet of Things
-
Oct. /Dec.
-
N. Koshizuka and K. Sakamura, "Ubiquitous ID: Standards for ubiquitous computing and the Internet of Things, " IEEE Pervasive Comput., vol. 9, no. 4, pp. 98-101, Oct. /Dec. 2010.
-
(2010)
IEEE Pervasive Comput.
, vol.9
, Issue.4
, pp. 98-101
-
-
Koshizuka, N.1
Sakamura, K.2
-
11
-
-
84860852441
-
NID-based Internet of Things and its application in airport aviation risk management
-
H. Ning et al., "nID-based Internet of Things and its application in airport aviation risk management, " Chin. J. Electron., vol. 21, no. 2, pp. 209-214, 2012.
-
(2012)
Chin. J. Electron.
, vol.21
, Issue.2
, pp. 209-214
-
-
Ning, H.1
-
12
-
-
84925491351
-
Tree-code modeling and addressing for non-ID physical objects in the Internet of Things
-
H. Ning, Y. Fu, S. Hu, and H. Liu, "Tree-code modeling and addressing for non-ID physical objects in the Internet of Things, " Telecommun. Syst., vol. 58, no. 3, pp. 195-204, 2015.
-
(2015)
Telecommun. Syst.
, vol.58
, Issue.3
, pp. 195-204
-
-
Ning, H.1
Fu, Y.2
Hu, S.3
Liu, H.4
-
13
-
-
78649457148
-
Physimetric identification (physi-ID)-Applying biometric concept in physical object identification
-
S. K. Kwok, O. P. H. Ng, A. H. C. Tsang, and H. M. Liem, "Physimetric identification (physi-ID)-Applying biometric concept in physical object identification, " Comput. Ind., vol. 62, no. 1, pp. 32-41, 2011.
-
(2011)
Comput. Ind.
, vol.62
, Issue.1
, pp. 32-41
-
-
Kwok, S.K.1
Ng, O.P.H.2
Tsang, A.H.C.3
Liem, H.M.4
-
14
-
-
84880973463
-
A review of face recognition methods
-
M. P. Beham and S. M. M. Roomi, "A review of face recognition methods, " Int. J. Pattern Recognit. Artif. Intell., vol. 27, no. 4, pp. 1-35, 2013.
-
(2013)
Int. J. Pattern Recognit. Artif. Intell.
, vol.27
, Issue.4
, pp. 1-35
-
-
Beham, M.P.1
Roomi, S.M.M.2
-
15
-
-
77951207098
-
Characteristic trade-offs in designing large-scale biometric-based identity management systems
-
S. A. Shaikh and J. R. Rabaiotti, "Characteristic trade-offs in designing large-scale biometric-based identity management systems, " J. Netw. Comput. Appl., vol. 33, no. 3, pp. 342-351, 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.3
, pp. 342-351
-
-
Shaikh, S.A.1
Rabaiotti, J.R.2
-
16
-
-
85086760579
-
Stochastic load balancing for virtual resource management in datacenters
-
to be published.
-
L. Yu et al., "Stochastic load balancing for virtual resource management in datacenters, " IEEE Trans. Cloud Comput., to be published. [Online]. Available: https://doi. org/10. 1109/TCC. 2016. 2525984
-
IEEE Trans. Cloud Comput.
-
-
Yu, L.1
-
17
-
-
84897474874
-
Strategies for exploiting independent cloud implementations of biometric experts in multibiometric scenarios
-
Mar.
-
P. Peer, Ž. Emeršic, J. Bule, J. Žganec-Gros, and V. Štruc, "Strategies for exploiting independent cloud implementations of biometric experts in multibiometric scenarios, " Math. Problems Eng., vol. 2014, pp. 1-15, Mar. 2014.
-
(2014)
Math. Problems Eng.
, vol.2014
, pp. 1-15
-
-
Peer, P.1
Emeršic, Ž.2
Bule, J.3
Žganec-Gros, J.4
Štruc, V.5
-
18
-
-
85009999820
-
CoRE: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost
-
Feb.
-
L. Yu, H. Shen, K. Sapra, L. Ye, and Z. Cai, "CoRE: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost, " IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 2, pp. 446-461, Feb. 2017. [Online]. Available: https://doi. org/10. 1109/TPDS. 2016. 2578928
-
(2017)
IEEE Trans. Parallel Distrib. Syst.
, vol.28
, Issue.2
, pp. 446-461
-
-
Yu, L.1
Shen, H.2
Sapra, K.3
Ye, L.4
Cai, Z.5
-
19
-
-
84983319464
-
Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters
-
San Francisco, CA, USA
-
L. Yu and Z. Cai, "Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters, " in Proc. IEEE Conf. Comput. Commun. (INFOCOM), San Francisco, CA, USA, 2016, pp. 1-9.
-
(2016)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
, pp. 1-9
-
-
Yu, L.1
Cai, Z.2
-
20
-
-
85029709840
-
Fog computing: A better solution for IoT
-
N. N. Khan, "Fog computing: A better solution for IoT, " Int. J. Eng. Tech. Res., vol. 3, no. 2, pp. 298-300, 2015.
-
(2015)
Int. J. Eng. Tech. Res.
, vol.3
, Issue.2
, pp. 298-300
-
-
Khan, N.N.1
-
21
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Helsinki, Finland
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things, " in Proc. 1st Edition MCC Workshop Mobile Cloud Comput., Helsinki, Finland, 2012, pp. 13-16.
-
(2012)
Proc. 1st Edition MCC Workshop Mobile Cloud Comput.
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
22
-
-
85029397733
-
Fog computingbased face identification and resolution scheme in Internet of Things
-
to be published
-
P. Hu, H. Ning, T. Qiu, Y. Zhang, and X. Luo, "Fog computingbased face identification and resolution scheme in Internet of Things, " IEEE Trans. Ind. Informat., to be published. [Online]. Available: https://doi. org/10. 1109/TII. 2016. 2607178
-
IEEE Trans. Ind. Informat.
-
-
Hu, P.1
Ning, H.2
Qiu, T.3
Zhang, Y.4
Luo, X.5
-
23
-
-
85009291777
-
A task-efficient sink node based on embedded multi-core soC for Internet of Things
-
Dec.
-
T. Qiu et al., "A task-efficient sink node based on embedded multi-core soC for Internet of Things, " Future Gener. Comput. Syst., Dec. 2016. Available: http://dx. doi. org/10. 1016/j. future. 2016. 12. 024
-
(2016)
Future Gener. Comput. Syst.
-
-
Qiu, T.1
-
24
-
-
84901427258
-
A survey on trust management for Internet of Things
-
Y. Zheng, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things, " J. Netw. Comput. Appl., vol. 42, no. 3, pp. 120-134, 2014.
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, Issue.3
, pp. 120-134
-
-
Zheng, Y.1
Zhang, P.2
Vasilakos, A.V.3
-
25
-
-
84979812926
-
-
Chichester, U. K. : Wiley
-
H. Song, G. A. Fink, and S. Jeschke, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. Chichester, U. K. : Wiley, 2017.
-
(2017)
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
-
-
Song, H.1
Fink, G.A.2
Jeschke, S.3
-
26
-
-
84991088919
-
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Dec.
-
Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, "Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
27
-
-
85026431678
-
Security enhancement for wireless multimedia communications by fountain code
-
Mar.
-
Q. Du, L. Sun, H. Song, and P. Ren, "Security enhancement for wireless multimedia communications by fountain code, " IEEE COMSOC MMTC Commun. C Front., vol. 11, no. 2, pp. 47-51, Mar. 2016.
-
(2016)
IEEE COMSOC MMTC Commun. C Front.
, vol.11
, Issue.2
, pp. 47-51
-
-
Du, Q.1
Sun, L.2
Song, H.3
Ren, P.4
-
28
-
-
84941286216
-
Policy-driven security management for fog computing: Preliminary framework and a case study
-
Redwood City, CA, USA
-
C. Dsouza, G.-J. Ahn, and M. Taguinod, "Policy-driven security management for fog computing: Preliminary framework and a case study, " in Proc. IEEE Int. Conf. Inf. Reuse Integr., Redwood City, CA, USA, 2014, pp. 16-23.
-
(2014)
Proc. IEEE Int. Conf. Inf. Reuse Integr.
, pp. 16-23
-
-
Dsouza, C.1
Ahn, G.-J.2
Taguinod, M.3
-
29
-
-
84958120409
-
Detection of man-in-The-middle attacks using physical layer wireless security techniques
-
L. Wang and A. M. Wyglinski, "Detection of man-in-the-middle attacks using physical layer wireless security techniques, " Wireless Commun. Mobile Comput., vol. 16, no. 4, pp. 408-426, 2016.
-
(2016)
Wireless Commun. Mobile Comput.
, vol.16
, Issue.4
, pp. 408-426
-
-
Wang, L.1
Wyglinski, A.M.2
-
30
-
-
84928596525
-
An overview of fog computing and its security issues
-
I. Stojmenovic, S. Wen, X. Huang, and H. Luan, "An overview of fog computing and its security issues, " Concurrency Comput. Pract. Exp., vol. 28, no. 1, pp. 2991-3005, 2016.
-
(2016)
Concurrency Comput. Pract. Exp.
, vol.28
, Issue.1
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
31
-
-
77955178939
-
SCiFI-A system for secure face identification
-
Oakland, CA, USA
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, "SCiFI-A system for secure face identification, " in Proc. IEEE Symp. Security Privacy, Oakland, CA, USA, 2010, pp. 239-254.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
32
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
San Diego, CA, USA
-
Y. Huang, L. Malka, D. Evans, and J. Katz, "Efficient privacy-preserving biometric identification, " presented at the Netw. Distrib. Syst. Security Symp. (NDSS), San Diego, CA, USA, 2011, pp. 421-434.
-
(2011)
The Netw. Distrib. Syst. Security Symp. (NDSS)
, pp. 421-434
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
33
-
-
84935496015
-
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
-
M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and cross-enterprise biometric identification, " Expert Syst. Appl., vol. 42, no. 21, pp. 7905-7916, 2015.
-
(2015)
Expert Syst. Appl.
, vol.42
, Issue.21
, pp. 7905-7916
-
-
Haghighat, M.1
Zonouz, S.2
Abdel-Mottaleb, M.3
-
34
-
-
84912535405
-
A framework for secure cloud-empowered mobile biometrics
-
Baltimore, MD, USA
-
A. S. Bommagani, M. C. Valenti, and A. Ross, "A framework for secure cloud-empowered mobile biometrics, " in Proc. IEEE Mil. Commun. Conf. (MILCOM), Baltimore, MD, USA, 2014, pp. 255-261.
-
(2014)
Proc. IEEE Mil. Commun. Conf. (MILCOM)
, pp. 255-261
-
-
Bommagani, A.S.1
Valenti, M.C.2
Ross, A.3
-
35
-
-
84883119889
-
Efficient privacy-preserving biometric identification in cloud computing
-
Turin, Italy
-
J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing, " in Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 2652-2660.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2652-2660
-
-
Yuan, J.1
Yu, S.2
-
36
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Nov.
-
Z. Xia et al., "A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
-
37
-
-
84961877275
-
On security and privacy issues of fog computing supported Internet of Things environment
-
Montreal, QC, Canada
-
K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, "On security and privacy issues of fog computing supported Internet of Things environment, " in Proc. 6th Int. Conf. Netw. Future (NOF), Montreal, QC, Canada, 2015, pp. 1-3.
-
(2015)
Proc. 6th Int. Conf. Netw. Future (NOF)
, pp. 1-3
-
-
Lee, K.1
Kim, D.2
Ha, D.3
Rajput, U.4
Oh, H.5
-
38
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
Qufu, China
-
S. Yi, Z. Qin, and Q. Li, "Security and privacy issues of fog computing: A survey, " in Proc. 10th Int. Conf. Wireless Algorithms Syst. Appl. (WASA), Qufu, China, 2015, pp. 685-695.
-
(2015)
Proc. 10th Int. Conf. Wireless Algorithms Syst. Appl. (WASA)
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
39
-
-
84912130127
-
The fog computing paradigm: Scenarios and security issues
-
Warsaw, Poland
-
I. Stojmenovic and S. Wen, "The fog computing paradigm: Scenarios and security issues, " in Proc. Federated Conf. Comput. Sci. Inf. Syst. (FedCSIS), Warsaw, Poland, 2014, pp. 1-8.
-
(2014)
Proc. Federated Conf. Comput. Sci. Inf. Syst. (FedCSIS)
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
40
-
-
33947167478
-
Face description with local binary patterns: Application to face recognition
-
Dec.
-
T. Ahonen, A. Hadid, and M. Pietikainen, "Face description with local binary patterns: Application to face recognition, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 2037-2041, Dec. 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.12
, pp. 2037-2041
-
-
Ahonen, T.1
Hadid, A.2
Pietikainen, M.3
-
41
-
-
84863403882
-
Computing the principal local binary patterns for face recognition using data mining tools
-
F. A. Pujol and J. C. Garcia, "Computing the principal local binary patterns for face recognition using data mining tools, " Expert Syst. Appl., vol. 39, no. 8, pp. 7165-7172, 2012.
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.8
, pp. 7165-7172
-
-
Pujol, F.A.1
Garcia, J.C.2
-
42
-
-
0036647193
-
Multiresolution gray-scale and rotation invariant texture classification with local binary patterns
-
Jul.
-
T. Ojala, M. Pietikäinen, and T. Mäenpää, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 971-987, Jul. 2002.
-
(2002)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.24
, Issue.7
, pp. 971-987
-
-
Ojala, T.1
Pietikäinen, M.2
Mäenpää, T.3
-
43
-
-
17744406666
-
An extended set of haar-like features for rapid object detection
-
Rochester, NY, USA
-
R. Lienhart and J. Maydt, "An extended set of haar-like features for rapid object detection, " in Proc. Int. Conf. Image Process., Rochester, NY, USA, 2002, pp. I-900-I-903.
-
(2002)
Proc. Int. Conf. Image Process.
, pp. I900-I903
-
-
Lienhart, R.1
Maydt, J.2
-
44
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New directions in cryptography, " IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
45
-
-
77950188068
-
Enhancing intelligence and dependability of a product line enabled pervasive middleware
-
W. Zhang, K. M. Hansen, and T. Kunz, "Enhancing intelligence and dependability of a product line enabled pervasive middleware, " Pervasive Mobile Comput., vol. 6, no. 2, pp. 198-217, 2010.
-
(2010)
Pervasive Mobile Comput.
, vol.6
, Issue.2
, pp. 198-217
-
-
Zhang, W.1
Hansen, K.M.2
Kunz, T.3
-
46
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography, " Designs Codes Cryptography, vol. 19, nos. 2-3, pp. 173-193, 2000.
-
(2000)
Designs Codes Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
|