Since the concern of privacy leakage extremely discourages user particip...
Non-intrusive load monitoring (NILM) aims to decompose aggregated electr...
Considerable attention has been paid to dynamic searchable symmetric
enc...
Searchable symmetric encryption (SSE) supports keyword search over outso...
Deep neural networks (DNNs) have been increasingly used in face recognit...
To develop Smart City, the growing popularity of Machine Learning (ML) t...
KNN has the reputation to be the word simplest but efficient supervised
...
The explosive growth of vehicle amount has given rise to a series of tra...
Software Defined Networks offer flexible and intelligent network operati...
The recent proliferation of smart devices has given rise to ubiquitous
c...
The combination of smart home platforms and automation apps introduces m...
Machine learning (ML) classifiers are invaluable building blocks that ha...
With the more and more extensive application of blockchain, blockchain
s...
As a popular application, mobile crowd sensing systems aim at providing ...
Nowadays, a large amount of user privacy-sensitive data is outsourced to...
In the Smart Grid with Renewable Energy Resources (RERs), the Residentia...
Face liveness detection has become a widely used technique with a growin...
Content-based image retrieval (CBIR) is one of the fundamental image
ret...
Phrase search allows retrieval of documents containing an exact phrase, ...
Constrained shortest distance (CSD) querying is one of the fundamental g...
Existing distributed denial-of-service attack detection in software defi...
Recent advances in Socially Aware Networks (SANs) have allowed its use i...
Recent advances in Socially Aware Networks (SANs) have allowed its use i...
In recent years, cognitive Internet of Things (CIoT) has received
consid...