All Stories

  1. Continuous Authentication for Consumer Electronics in Smart City Surveillance
  2. Real-Time Threat Detection and AI-Driven Predictive Security for Consumer Applications
  3. Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface
  4. Scalable computing for large-scale multimedia data analytics
  5. Mitigation of atmospheric losses using dual‐polarized 16‐QAM MIMO technique in free‐space optical system in various weather conditions
  6. Blockchain-Enabled Secure Collaborative Model Learning using Differential Privacy for IoT-Based Big Data Analytics
  7. Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs
  8. Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service
  9. Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
  10. UIoTN‐PMSE: Ubiquitous IoT network‐based predictive modeling in smart environment
  11. PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration
  12. Mobile Application-Based Sign Language Detector for Deaf People
  13. Data Analytics Applications in Healthcare, Hospitality, Marketing, and Security
  14. AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images
  15. A Chaotic System and Count Tracking Mechanism-based Dynamic S-Box and Secret Key Generation
  16. Effective College English Teaching Based on Teacher-student Interactive Model
  17. Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing
  18. Artificial Intelligence-Based Cyber Security Applications
  19. Intelligent Autonomous Drones in Industry 4.0
  20. Comparative Study of Graph Theory for Network System
  21. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
  22. Optimized Learning Strategy Towards Research-LED Teaching Curriculum Development
  23. College music education and teaching based on AI techniques
  24. Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
  25. Content-Based Music Recommendation Using Non-Stationary Bayesian Reinforcement Learning
  26. Blockchain architecture, taxonomy, challenges, and applications
  27. Blockchain for digital rights management
  28. Blockchain for intrusion detection systems
  29. Contributors
  30. Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques
  31. Optimized Tree Strategy with Principal Component Analysis Using Feature Selection-Based Classification for Newborn Infant’s Jaundice Symptoms
  32. Soccer player activity prediction model using an internet of things-assisted wearable system
  33. Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices
  34. Artificial intelligence on economic evaluation of energy efficiency and renewable energy technologies
  35. Effect of environmental and social responsibility in energy-efficient management models for smart cities infrastructure
  36. Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
  37. GCACS-IoD: A certificate based generic access control scheme for Internet of drones
  38. COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking
  39. Guest editorial of the special issue “remote sensing in water management and hydrology”
  40. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
  41. BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
  42. Public key encryption with equality test for Industrial Internet of Things system in cloud computing
  43. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications
  44. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  45. A Comparative Study of Energy Retaining Objective Functions in RPL for Improving Network Lifetime in IoT Environment
  46. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
  47. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
  48. A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification
  49. A lightweight machine learning-based authentication framework for smart IoT devices
  50. Security analysis on “mutual authentication scheme for multimedia medical information systems”
  51. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  52. Bio-inspired cryptosystem with DNA cryptography and neural networks
  53. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
  54. An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems
  55. Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service
  56. Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks
  57. An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
  58. RETRACTED ARTICLE: Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization
  59. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES
  60. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
  61. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
  62. Introduction to the special section on Big data and IoT in e-healthcare
  63. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
  64. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
  65. Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
  66. Modification of AES using genetic algorithms for high-definition image encryption
  67. Consistent and effective energy utilisation of node model for securing data in wireless sensor networks
  68. Design and analysis of smart card-based authentication scheme for secure transactions
  69. Introduction to the special section on Big data and IoT in e-healthcare
  70. Labelled decision-making method based on neural network model and pruning algorithm
  71. A New Malware Detection System Using Machine Learning Techniques for API Call Sequences
  72. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
  73. An efficient secure communication for healthcare system using wearable devices
  74. Preface
  75. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
  76. CT and MRI Image Fusion Based on Discrete Wavelet Transform and Type-2 Fuzzy Logic
  77. Comparative study of cloud platforms to develop a Chatbot
  78. An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion
  79. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
  80. Adaptive new top-hat transform and multi-scale sequential toggle operator based infrared image enhancement
  81. Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
  82. Secure Protocol for Subscriber Identity Module
  83. Wireless and Mobile Networks: Security and Privacy Issues
  84. Security on “A Lightweight Authentication Scheme with User Untraceability”
  85. Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”
  86. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
  87. A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
  88. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
  89. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
  90. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
  91. Security problems of a “more secure remote user authentication scheme”
  92. Remote user authentication scheme using smart card: a review
  93. Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
  94. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
  95. A secure remote user mutual authentication scheme using smart cards
  96. Cryptanalysis of oPass
  97. Scalable and secure data sharing for dynamic groups in cloud
  98. An efficient technique for preventing SQL injection attack using pattern matching algorithm
  99. The impact of Universal Active Surveillance for MRSA and cohorting on MRSA infections