Open Access
ITM Web Conf.
Volume 52, 2023
International Conference on Connected Object and Artificial Intelligence (COCIA’2023)
Article Number 02009
Number of page(s) 11
Section Artificial Intelligence and its Application
Published online 08 May 2023
  1. X. Cheng, F. Chen, D. Xie, H. Sun, and C. Huang, J Med Syst 44, 52 (2020) [CrossRef] [MathSciNet] [Google Scholar]
  2. R. Kumar, W. Wang, J. Kumar, T. Yang, A. Khan, W. Ali, and I. Ali, Computerized Medical Imaging and Graphics 87, 101812 (2021) [CrossRef] [Google Scholar]
  3. H. Huang, P. Zhu, F. Xiao, X. Sun, and Q. Huang, Computers & Security 99, 102010 (2020) [CrossRef] [Google Scholar]
  4. D. Wang and X. Zhang, IEEE Access 8, 56045 (2020) [CrossRef] [Google Scholar]
  5. I. Makhdoom, I. Zhou, M. Abolhasan, J. Lipman, and W. Ni, Computers & Security 88, 101653 (2020) [CrossRef] [Google Scholar]
  6. A. Qashlan, P. Nanda, X. He, and M. Mohanty, IEEE Access 9, 103651 (2021) [CrossRef] [Google Scholar]
  7. N. Deepa, Q.-V. Pham, D. C. Nguyen, S. Bhattacharya, B. Prabadevi, T. R. Gadekallu, P. K. R. Maddikunta, F. Fang, and P. N. Pathirana, Future Generation Computer Systems 131, 209 (2022) [CrossRef] [Google Scholar]
  8. A. Ahmed, S. Abdullah, M. Bukhsh, I. Ahmad, and Z. Mushtaq, IEEE Access 10, 11404 (2022) [CrossRef] [Google Scholar]
  9. S. Muralidharan and H. Ko, in 2019 IEEE International Conference on Consumer Electronics (ICCE) (IEEE, Las Vegas, NV, USA, 2019), pp. 1–2 [Google Scholar]
  10. J. Liu, Z. Liu, C. Sun, and J. Zhuang, Journal of Artificial Intelligence and Technology 2, 23 (2022) [Google Scholar]
  11. A. Mubarakali, Mobile Netw Appl 25, 1330 (2020) [CrossRef] [Google Scholar]
  12. S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, IEEE Transactions on Systems, Man, and Cybernetics: Systems 49, 2266 (2019) [CrossRef] [Google Scholar]
  13. L. Golightly, P. Modesti, R. Garcia, and V. Chang, Cyber Security and Applications 100015 (2023) [CrossRef] [Google Scholar]
  14. H. Jin, Y. Luo, P. Li, and J. Mathew, IEEE Access 7, 61656 (2019) [CrossRef] [Google Scholar]
  15. P. Xi, X. Zhang, L. Wang, W. Liu, and S. Peng, Applied Sciences 12, 7912 (2022) [CrossRef] [Google Scholar]
  16. P. K. Wan, L. Huang, and H. Holtskog, IEEE Access 8, 49645 (2020) [CrossRef] [Google Scholar]
  17. Q. Feng, D. He, S. Zeadally, M. K. Khan, and N. Kumar, Journal of Network and Computer Applications 126, 45 (2019) [CrossRef] [Google Scholar]
  18. L. Peng, W. Feng, Z. Yan, Y. Li, X. Zhou, and S. Shimizu, Digital Communications and Networks 7, 295 (2021) [CrossRef] [Google Scholar]
  19. S. Mathur, A. Kalla, G. Gür, M. K. Bohra, and M. Liyanage, Computer Networks 227, 109726 (2023) [CrossRef] [Google Scholar]
  20. X. Guo, G. Zhang, and Y. Zhang, Sensors 23, 155 (2023) [Google Scholar]
  21. L. T. Nguyen, L. D. Nguyen, T. Hoang, D. Bandara, Q. Wang, Q. Lu, X. Xu, L. Zhu, P. Popovski, and S. Chen, (2023) [Google Scholar]
  22. S. Nakamoto, (n.d.) [Google Scholar]
  23. M. Shen, L. Zhu, and K. Xu, in Blockchain: Empowering Secure Data Sharing, edited by M. Shen, L. Zhu, and K. Xu (Springer, Singapore, 2020), pp. 15–27 [CrossRef] [Google Scholar]
  24. D. P. Hellwig and A. Huchzermeier, in Innovative Technology at the Interface of Finance and Operations: Volume II, edited by V. Babich, J. R. Birge, and G. Hilary (Springer International Publishing, Cham, 2022), pp. 31–49 [CrossRef] [Google Scholar]
  25. B. Sharma, R. Halder, and J. Singh, in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (2020), pp. 1–6 [MathSciNet] [Google Scholar]
  26. A. Manzoor, A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage, Journal of Network and Computer Applications 176, 102917 (2021) [CrossRef] [Google Scholar]
  27. S. Saleh and F. Shayor, Frontiers in Blockchain 3, (2020) [CrossRef] [Google Scholar]
  28. H. Xu, Q. He, X. Li, B. Jiang, and K. Qin, IEEE Access 8, 87552 (2020) [CrossRef] [Google Scholar]
  29. S. Wang, H. Li, J. Chen, J. Wang, and Y. Deng, Journal of Information Security and Applications 66, 103134 (2022) [CrossRef] [Google Scholar]
  30. M. Raikwar, D. Gligoroski, and K. Kralevska, IEEE Access 7, 148550 (2019) [CrossRef] [Google Scholar]
  31. J. R. Shaikh and G. Iliev, in 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) (2018), pp. 155–158 [Google Scholar]
  32. H. Ghayvat, S. Pandya, P. Bhattacharya, M. Zuhair, M. Rashid, S. Hakak, and K. Dev, IEEE Journal of Biomedical and Health Informatics 26, 1937 (2022) [CrossRef] [Google Scholar]
  33. N. Eltayieb, R. Elhabob, A. Hassan, and F. Li, Journal of Systems Architecture 102, 101653 (2020) [CrossRef] [Google Scholar]
  34. Y. Chen, B. Hu, H. Yu, Z. Duan, and J. Huang, Electronics 10, 2359 (2021) [CrossRef] [Google Scholar]
  35. K. O.-B. O. Agyekum, Q. Xia, E. B. Sifah, C. N. A. Cobblah, H. Xia, and J. Gao, IEEE Systems Journal 16, 1685 (2022) [CrossRef] [Google Scholar]
  36. Y.-H. Park, Y. Kim, S.-O. Lee, and K. Ko, Applied Sciences 11, 9422 (2021) [CrossRef] [Google Scholar]
  37. W. Chen, S. Zhu, J. Li, J. Wu, C.-L. Chen, and Y.-Y. Deng, Sensors 21, 7765 (2021) [CrossRef] [Google Scholar]
  38. J. Gao, H. Yu, X. Zhu, and X. Li, IEEE Systems Journal 15, 5233 (2021) [CrossRef] [Google Scholar]
  39. E. Balistri, F. Casellato, C. Giannelli, and C. Stefanelli, ICT Express 7, 308 (2021) [CrossRef] [Google Scholar]
  40. S. Athanere and R. Thakur, Journal of King Saud University Computer and Information Sciences 34, 1523 (2022) [CrossRef] [Google Scholar]
  41. A. A. Battah, M. M. Madine, H. Alzaabi, I. Yaqoob, K. Salah, and R. Jayaraman, IEEE Access 8, 196813 (2020) [CrossRef] [Google Scholar]
  42. E. S. Babu, A. Barthwal, and R. Kaluri, Computer Communications 199, 10 (2023) [CrossRef] [Google Scholar]
  43. S. Ding, J. Cao, C. Li, K. Fan, and H. Li, IEEE Access 7, 38431 (2019) [CrossRef] [Google Scholar]
  44. J. P. Cruz, Y. Kaji, and N. Yanai, IEEE Access 6, 12240 (2018) [CrossRef] [Google Scholar]
  45. R. Saha, G. Kumar, M. Conti, T. Devgun, T. Kim, M. Alazab, and R. Thomas, IEEE Transactions on Industrial Informatics 18, 3452 (2022) [CrossRef] [Google Scholar]
  46. Z. Zhang, J. Zhang, S. Kang, and Z. Li, in Communications, Signal Processing, and Systems, edited by Q. Liang, W. Wang, X. Liu, Z. Na, and B. Zhang (Springer Nature, Singapore, 2023), pp. 190–197 [CrossRef] [Google Scholar]
  47. E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukolić, S. W. Cocco, and J. Yellick, in Proceedings of the Thirteenth EuroSys Conference (2018), pp. 1–15 [Google Scholar]
  48. J. Song, Y. Yang, J. Mei, G. Zhou, W. Qiu, Y. Wang, L. Xu, Y. Liu, J. Jiang, Z. Chu, W. Tan, and Z. Lin, Energies 15, 2570 (2022) [CrossRef] [Google Scholar]
  49. G. Al-Sumaidaee, R. Alkhudary, Z. Zilic, and A. Swidan, Information Processing & Management 60, 103160 (2023) [CrossRef] [Google Scholar]
  50. D. Lee and M. Song, IEEE Access 9, 158122 (2021) [CrossRef] [Google Scholar]
  51. Z. A. Khan and A. S. Namin, (2020) [Google Scholar]
  52. H. Huang, X. Chen, and J. Wang, Sci. China Inf. Sci. 63, 130101 (2019) [Google Scholar]
  53. M. Firdaus and K.-H. Rhee, Applied Sciences 11, 414 (2021) [CrossRef] [Google Scholar]
  54. M. Gawas, H. Patil, and S. S. Govekar, Peer-to-Peer Netw. Appl. 14, 2840 (2021) [CrossRef] [Google Scholar]
  55. X. Li, L. Ge, J. Chen, and Z. Peng, Journal of Systems Architecture 131, 102702 (2022) [CrossRef] [Google Scholar]
  56. C. Easttom, in Modern Cryptography: Applied Mathematics for Encryption and Information Security, edited by W. Easttom (Springer International Publishing, Cham, 2022), pp. 397–407 [CrossRef] [Google Scholar]
  57. T. M. Fernández-Caramès and P. Fraga-Lamas, IEEE Access 8, 21091 (2020) [CrossRef] [Google Scholar]
  58. A. A. Abd El-Latif, B. Abd-El-Atty, I. Mehmood, K. Muhammad, S. E. VenegasAndraca, and J. Peng, Information Processing & Management 58, 102549 (2021) [CrossRef] [Google Scholar]
  59. Y. Wang, J. Li, S. Zhao, and F. Yu, IEEE Access 8, 190652 (2020) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.