Tables are everywhere, from scientific journals, papers, websites, and
n...
Contact tracing is a very effective way to control the COVID-19-like
pan...
In smart grid, malicious customers may compromise their smart meters (SM...
In advanced metering infrastructure (AMI), smart meters (SMs), which are...
The simultaneous charging of many electric vehicles (EVs) stresses the
d...
In advanced metering infrastructure (AMI), smart meters (SMs) are instal...
Electronic health records (EHR) systems contain vast amounts of medical
...
Ride-sharing is a service that enables drivers to share their trips with...
Energy storage units (ESUs) including EVs and home batteries enable seve...
Purveyors of malicious network attacks continue to increase the complexi...
In this paper, we propose a multi-authority attribute-based signcryption...
Searching for available parking spaces is a major problem for drivers in...
In this paper, we propose a Sybil attack detection scheme using proofs o...
Recently, Autonomous Vehicles (AVs) have gained extensive attention from...
Energy storage units (ESUs) enable several attractive features of modern...
In Advanced Metering Infrastructure (AMI) networks, smart meters should ...
Ride-sharing allows multiple persons to share their trips together in on...
Ride-sharing allows multiple persons to share their trips together in on...
Modern smart grids rely on advanced metering infrastructure (AMI) networ...
We propose using cascaded classifiers for a keyword spotting (KWS) task ...