default search action
ACM Transactions on Internet Technology, Volume 21
Volume 21, Number 1, February 2021
Visions Paper
- Paolo Boldi, Georgios Gousios:
Fine-Grained Network Analysis for Modern Software Ecosystems. 1:1-1:14
- Liwei Huang, Yutao Ma, Yanbo Liu, Keqing He:
DAN-SNR: A Deep Attentive Network for Social-aware Next Point-of-interest Recommendation. 2:1-2:27 - Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu:
Beyond Frequency: Utility Mining with Varied Item-specific Minimum Utility. 3:1-3:32
- Sabah Mohammed, Jinan Fiaidhi, Carlos Ramos, Tai-Hoon Kim, Wai-Chi Fang, Tarek F. Abdelzaher:
Blockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of ThingsBlockchain in eCommerce: A Special Issue of the ACM Transactions on Internet of Things. 11-55 - Yongjun Ren, Jian Qi, Yepeng Liu, Jin Wang, Gwang-Jun Kim:
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator. 5:1-5:19 - Honghao Gao, Wanqiu Huang, Yucong Duan:
The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments: A QoS Prediction Perspective. 6:1-6:23 - Xiaolong Xu, Dawei Zhu, Xiaoxian Yang, Shuo Wang, Lianyong Qi, Wanchun Dou:
Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain. 7:1-7:17 - Junho Kim, Mucheol Kim:
Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection. 8:1-8:16 - Shuiguang Deng, Guanjie Cheng, Hailiang Zhao, Honghao Gao, Jianwei Yin:
Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce. 9:1-9:19 - Liang Chen, Jiaying Peng, Yang Liu, Jintang Li, Fenfang Xie, Zibin Zheng:
Phishing Scams Detection in Ethereum Transaction Network. 10:1-10:16 - Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. 11:1-11:19 - Zhitao Guan, Naiyu Wang, Xunfeng Fan, Xueyan Liu, Longfei Wu, Shaohua Wan:
Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach. 12:1-12:17 - Qun Song, Yuhao Chen, Yan Zhong, Kun Lan, Simon Fong, Rui Tang:
A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology. 13:1-13:24 - Junho Jeong, Donghyo Kim, Sun-Young Ihm, Yangsun Lee, Yunsik Son:
Multilateral Personal Portfolio Authentication System Based on Hyperledger Fabric. 14:1-14:17 - You Sun, Rui Xue, Rui Zhang, Qianqian Su, Sheng Gao:
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain. 15:1-15:24
- Mahmoud Barhamgi, Michael N. Huhns, Charith Perera, Pinar Yolum:
Introduction to the Special Section on Human-centered Security, Privacy, and Trust in the Internet of Things. 16:1-16:3 - Zheng Yan, Li Peng, Wei Feng, Laurence T. Yang:
Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking. 17:1-17:28 - Amit Kumar Singh, Sriti Thakur, Alireza Jolfaei, Gautam Srivastava, Mohamed Elhoseny, Anand Mohan:
Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents. 18:1-18:20 - Cong Peng, Jianhua Chen, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. 19:1-19:23 - Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. 20:1-20:25 - Yekta Said Can, Cem Ersoy:
Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring. 21:1-21:17 - Edy Hourany, Bachir Habib, Camille Fountaine, Abdallah Makhoul, Benoît Piranda, Julien Bourgeois:
PROLISEAN: A New Security Protocol for Programmable Matter. 22:1-22:29 - Faiza Loukil, Chirine Ghedira Guégan, Khouloud Boukadi, Aïcha-Nabila Benharkat, Elhadj Benkhelifa:
Data Privacy Based on IoT Device Behavior Control Using Blockchain. 23:1-23:20 - Kaixi Hu, Lin Li, Jianquan Liu, Daniel Sun:
DuroNet: A Dual-robust Enhanced Spatial-temporal Learning Network for Urban Crime Prediction. 24:1-24:24 - Vikram Mehta, Daniel Gooch, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Privacy Care: A Tangible Interaction Framework for Privacy Management. 25:1-25:32 - Tanusree Sharma, Hunter A. Dyer, Masooda N. Bashir:
Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective. 26:1-26:24
Volume 21, Number 2, June 2021
- Xuanzhe Liu, Shangguang Wang, Yun Ma, Ying Zhang, Qiaozhu Mei, Yunxin Liu, Gang Huang:
Operating Systems for Resource-adaptive Intelligent Software: Challenges and Opportunities. 27:1-27:19
- Francesco Piccialli, Nik Bessis, Gwanggil Jeon, Calton Pu:
Introduction to the Special Section on Data Science for Cyber-Physical Systems. 28e:1-28e:7 - Zhihan Lv, Amit Kumar Singh:
Big Data Analysis of Internet of Things System. 28:1-28:15 - Muhammad Tanveer, S. Sharma, Khan Muhammad:
Large-Scale Least Squares Twin SVMs. 29:1-29:19 - Claudio Savaglio, Giancarlo Fortino:
A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing. 30:1-30:22 - Kuljeet Kaur, Sahil Garg, Georges Kaddoum, Neeraj Kumar:
Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems. 31:1-31:24 - Chun-Wei Tsai, Zhi-Yan Fang:
An Effective Hyperparameter Optimization Algorithm for DNN to Predict Passengers at a Metro Station. 32:1-32:24 - Pin Ni, Yuming Li, Gangmin Li, Victor I. Chang:
A Hybrid Siamese Neural Network for Natural Language Inference in Cyber-Physical Systems. 33:1-33:25 - Chen Zhang, Zhuo Tang, Kenli Li, Jianzhong Yang, Li Yang:
A Polishing Robot Force Control System Based on Time Series Data in Industrial Internet of Things. 34:1-34:22 - Yuyu Yin, Haoran Xu, Tingting Liang, Manman Chen, Honghao Gao, Antonella Longo:
Leveraging Data Augmentation for Service QoS Prediction in Cyber-physical Systems. 35:1-35:25 - Martin Garriga, Koen Aarns, Christos Tsigkanos, Damian A. Tamburri, Willem-Jan van den Heuvel:
DataOps for Cyber-Physical Systems Governance: The Airport Passenger Flow Case. 36:1-36:25 - Iris Weiß, Birgit Vogel-Heuser, Emanuel Trunzer, Simon Kruppa:
Product Quality Monitoring in Hydraulic Presses Using a Minimal Sample of Sensor and Actuator Data. 37:1-37:23
- Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. 38e:1-38e:3 - Laizhong Cui, Zhe Xiao, Jiahao Wang, Fei Chen, Yi Pan, Hua Dai, Jing Qin:
Improving Vaccine Safety Using Blockchain. 38:1-38:24 - Truc D. T. Nguyen, My T. Thai:
A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels. 39:1-39:22 - Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. 40:1-40:21 - Jun Feng, Laurence T. Yang, Yuxiang Zhu, Nicholaus J. Gati, Yijun Mo:
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems. 41:1-41:17 - Ye Luo, Zehai Su, Wei Zheng, Zhaobin Chen, Fuqin Wang, Zhemin Zhang, Jinjun Chen:
A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems. 42:1-42:21 - Hao Wang, Shenglan Ma, Chaonian Guo, Yulei Wu, Hong-Ning Dai, Di Wu:
Blockchain-Based Power Energy Trading Management. 43:1-43:16 - Michal Król, Alberto Sonnino, Mustafa Al-Bassam, Argyrios G. Tasiopoulos, Etienne Rivière, Ioannis Psaras:
Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks. 44:1-44:27
- Bin Cao, Jiawei Wu, Sichao Wang, Honghao Gao, Jing Fan, Shuiguang Deng, Jianwei Yin, Xuan Liu:
Unsupervised Derivation of Keyword Summary for Short Texts. 45:1-45:23 - Vandana Bharti, Bhaskar Biswas, Kaushal Kumar Shukla:
A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security. 46:1-46:28 - Shijie Hao, Tao Chen, Yang Wang, Yanrong Guo, Meng Wang:
Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer's Disease Study. 47:1-47:16 - Yuanpeng Zhang, Yizhang Jiang, Lianyong Qi, Md. Zakirul Alam Bhuiyan, Pengjiang Qian:
Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection. 48:1-48:21 - Jimmy Ming-Tai Wu, Gautam Srivastava, Jerry Chun-Wei Lin, Qian Teng:
A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments. 49:1-49:26 - Bjarne Pfitzner, Nico Steckhan, Bert Arnrich:
Federated Learning in a Medical Context: A Systematic Literature Review. 50:1-50:31 - Karam Bou Chaaya, Richard Chbeir, Mansour Naser Alraja, Philippe Arnould, Charith Perera, Mahmoud Barhamgi, Djamal Benslimane:
δ-Risk: Toward Context-aware Multi-objective Privacy Management in Connected Environments. 51:1-51:31 - Abhinav Kumar, Sanjay Kumar Singh, K. Lakshmanan, Sonal Saxena, Sameer Shrivastava:
A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images. 52:1-52:22
Volume 21, Number 3, August 2021
- Amit Kumar Singh, Q. M. Jonathan Wu, Ali Al-Haj, Calton Pu:
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare. 53:1-53:4 - Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, Martin Randles:
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. 54:1-54:23 - Zhihan Lv, Francesco Piccialli:
The Security of Medical Data on Internet Based on Differential Privacy Technology. 55:1-55:18 - Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Alireza Jolfaei, Yanyan Xu:
FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification. 56:1-56:15 - Zijie Yue, Shuai Ding, Lei Zhao, Youtao Zhang, Zehong Cao, Mohammad Tanveer, Alireza Jolfaei, Xi Zheng:
Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework. 57:1-57:21 - Kaijian Xia, Xiang Wu, Yaqing Mao, Huanhuan Wang:
Secure DNA Motif-Finding Method Based on Sampling Candidate Pruning. 58:1-58:19 - Bharat Richhariya, Mohammad Tanveer:
An Efficient Angle-based Universum Least Squares Twin Support Vector Machine for Classification. 59:1-59:24 - Tae-Yeun Kim, Sung-Hwan Kim, Hoon Ko:
Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System. 60:1-60:17 - Cong Peng, Debiao He, Jianhua Chen, Neeraj Kumar, Muhammad Khurram Khan:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. 61:1-61:24 - Somanka Maiti, Ashish Kumar, Smriti Jain, Gaurav Bhatnagar:
A Novel Image Inpainting Framework Using Regression. 62:1-62:16 - Haolun Li, Chi-Man Pun, Feng Xu, Longsheng Pan, Rui Zong, Hao Gao, Huimin Lu:
A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis. 63:1-63:22
- Wei Wei, Ammar Rayes, Wei Wang, Yiduo Mei:
Special Section on AI-Empowered Internet of Things for Smart Cities. 64:1-64:3 - Mohamad Ali Mehrabi, Naila Mukhtar, Alireza Jolfaei:
Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms. 65:1-65:20 - Prateek Garg, Anirudh Srinivasan Chakravarthy, Murari Mandal, Pratik Narang, Vinay Chamola, Mohsen Guizani:
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities. 66:1-66:18 - Guangwei Gao, Dong Zhu, Huimin Lu, Yi Yu, Heyou Chang, Dong Yue:
Robust Facial Image Super-Resolution by Kernel Locality-Constrained Coupled-Layer Regression. 67:1-67:15 - Francesco Piccialli, Fabio Giampaolo, Edoardo Prezioso, Danilo Crisci, Salvatore Cuomo:
Predictive Analytics for Smart Parking: A Deep Learning Approach in Forecasting of IoT Data. 68:1-68:21 - Feiran Huang, Chaozhuo Li, Boyu Gao, Yun Liu, Sattam Alotaibi, Hao Chen:
Deep Attentive Multimodal Network Representation Learning for Social Media Images. 69:1-69:17 - David K. Y. Chiu, Tao Xu, Iker Gondra:
Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications. 70:1-70:17 - Liangtian Wan, Mingyue Zhang, Lu Sun, Xianpeng Wang:
Machine Learning Empowered IoT for Intelligent Vehicle Location in Smart Cities. 71:1-71:25 - Laha Ale, Ning Zhang, Scott A. King, Jose Guardiola:
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities. 72:1-72:21 - Celestine Iwendi, Saif Ur Rehman, Abdul Rehman Javed, Suleman Khan, Gautam Srivastava:
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. 73:1-73:22 - He-Xuan Hu, Wen-Jie Mao, Zhen-Zhou Lin, Qiang Hu, Ye Zhang:
Multimodal Brain Tumor Segmentation Based on an Intelligent UNET-LSTM Algorithm in Smart Hospitals. 74:1-74:14
- Qianmu Li, Shunmei Meng, Xiaonan Sang, Hanrui Zhang, Shoujin Wang, Ali Kashif Bashir, Keping Yu, Usman Tariq:
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing. 75:1-75:33 - Wu Chen, Yong Yu, Keke Gai, Jiamou Liu, Kim-Kwang Raymond Choo:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. 76:1-76:17 - Mehedi Masud, Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, Roobaea Alroobaea, Mubarak Alrashoud, Salman Ali AlQahtani:
CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson's Disease. 77:1-77:18 - Shehzad Ashraf Chaudhry, Azeem Irshad, Khalid Yahya, Neeraj Kumar, Mamoun Alazab, Yousaf Bin Zikria:
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. 78:1-78:19 - Lucia Cascone, Aniello Castiglione, Michele Nappi, Fabio Narducci, Ignazio Passero:
Waiting for Tactile: Robotic and Virtual Experiences in the Fog. 79:1-79:19 - Liang Tan, Na Shi, Keping Yu, Moayad Aloqaily, Yaser Jararweh:
A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things. 80:1-80:20
Volume 21, Number 4, November 2021
- Safa Otoum, Burak Kantarci, Hussein T. Mouftah:
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures. 81:1-81:22 - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei:
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing. 82:1-82:16 - Zhihan Lv, Dongliang Chen, Amit Kumar Singh:
Big Data Processing on Volunteer Computing. 83:1-83:20 - Bin Yuan, Chen Lin, Deqing Zou, Laurence Tianruo Yang, Hai Jin:
Detecting Malicious Switches for a Secure Software-defined Tactile Internet. 84:1-84:23 - Mehedi Masud, M. Shamim Hossain, Hesham Alhumyani, Sultan S. Alshamrani, Omar Cheikhrouhou, Saleh Ibrahim, Ghulam Muhammad, Amr Ezz El-Din Rashed, B. B. Gupta:
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images. 85:1-85:17 - Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim Tafazolli:
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System. 86:1-86:21 - Ismaeel Al Ridhawi, Moayad Aloqaily, Yaser Jararweh:
An Incentive-based Mechanism for Volunteer Computing Using Blockchain. 87:1-87:22 - Di Wu, Wei Shi, Xiangyu Ma:
A Novel Real-time Anti-spam Framework. 88:1-88:27 - Jimmy Ming-Tai Wu, Qian Teng, Gautam Srivastava, Matin Pirouz, Jerry Chun-Wei Lin:
The Efficient Mining of Skyline Patterns from a Volunteer Computing Network. 89:1-89:20 - Yan-Chun Chen, Ren-Hung Hwang, Mu-Yen Chen, Chih-Chin Wen, Chih-Ping Hsu:
Screw Slot Quality Inspection System Based on Tactile Network. 90:1-90:17
- Huimin Lu, Liao Wu, Giancarlo Fortino, Schahram Dustdar:
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks. 91e:1-91e:3 - Zhiyang Lin, Jihua Zhu, Zutao Jiang, Yujie Li, Yaochen Li, Zhongyu Li:
Merging Grid Maps in Diverse Resolutions by the Context-based Descriptor. 91:1-91:21 - Zhihan Lv, Liang Qiao, Qingjun Wang:
Cognitive Robotics on 5G Networks. 92:1-92:18 - Xin Jin, Yuwei Duan, Ying Zhang, Yating Huang, Mengdong Li, Ming Mao, Amit Kumar Singh, Yujie Li:
Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security. 93:1-93:15 - Rushi Lan, Jing Wang, Wenming Huang, Zhenrong Deng, Xiyan Sun, Zhuo Chen, Xiaonan Luo:
Chinese Emotional Dialogue Response Generation via Reinforcement Learning. 94:1-94:17 - Song Deng, Fulin Chen, Xia Dong, Guangwei Gao, Xindong Wu:
Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition. 95:1-95:28 - Buddhadeb Pradhan, Nirmal Baran Hui, Diptendu Sinha Roy, Gautam Srivastava, Jerry Chun-Wei Lin:
Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots. 96:1-96:15 - Min Chen, Wenjing Xiao, Long Hu, Yujun Ma, Yin Zhang, Guangming Tao:
Cognitive Wearable Robotics for Autism Perception Enhancement. 97:1-97:16 - Wenpeng Lu, Rui Yu, Shoujin Wang, Can Wang, Ping Jian, Heyan Huang:
Sentence Semantic Matching Based on 3D CNN for Human-Robot Language Interaction. 98:1-98:24
- Zhihan Lv, Liang Qiao, Amit Kumar Singh, Qingjun Wang:
AI-empowered IoT Security for Smart Cities. 99:1-99:21 - Ramesh Sekaran, Rizwan Patan, Fadi Al-Turjman:
A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET. 100:1-100:15 - Huniya Shahid, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Ikram Ud Din, Neeraj Kumar, Carsten Maple:
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things. 101:1-101:26 - Li Kuang, Jianbo Zheng, Kemu Li, Honghao Gao:
Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities. 102:1-102:24 - Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb, Carsten Maple, Mohammad Hammoudeh, Paulo André Lima de Castro, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. 103:1-103:30 - Zhihan Lv, Liang Qiao, Sahil Verma, Kavita:
AI-enabled IoT-Edge Data Analytics for Connected Living. 104:1-104:20 - V. Gomathy, K. Janarthanan, Fadi Al-Turjman, Ramachandran Sitharthan, M. Rajesh, Krishnasamy Vengatesan, T. Priya Reshma:
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation. 105:1-105:10 - Wei Wang, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar, Wei Wei:
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction. 106:1-106:13
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.