All Stories

  1. Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface
  2. Scalable computing for large-scale multimedia data analytics
  3. Mitigation of atmospheric losses using dual‐polarized 16‐QAM MIMO technique in free‐space optical system in various weather conditions
  4. Blockchain-Enabled Secure Collaborative Model Learning using Differential Privacy for IoT-Based Big Data Analytics
  5. Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs
  6. Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service
  7. Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
  8. UIoTN‐PMSE: Ubiquitous IoT network‐based predictive modeling in smart environment
  9. PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration
  10. Mobile Application-Based Sign Language Detector for Deaf People
  11. Data Analytics Applications in Healthcare, Hospitality, Marketing, and Security
  12. AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images
  13. A Chaotic System and Count Tracking Mechanism-based Dynamic S-Box and Secret Key Generation
  14. Effective College English Teaching Based on Teacher-student Interactive Model
  15. Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing
  16. Artificial Intelligence-Based Cyber Security Applications
  17. Intelligent Autonomous Drones in Industry 4.0
  18. Comparative Study of Graph Theory for Network System
  19. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
  20. Optimized Learning Strategy Towards Research-LED Teaching Curriculum Development
  21. College music education and teaching based on AI techniques
  22. Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
  23. Content-Based Music Recommendation Using Non-Stationary Bayesian Reinforcement Learning
  24. Blockchain architecture, taxonomy, challenges, and applications
  25. Blockchain for digital rights management
  26. Blockchain for intrusion detection systems
  27. Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques
  28. Optimized Tree Strategy with Principal Component Analysis Using Feature Selection-Based Classification for Newborn Infant’s Jaundice Symptoms
  29. Soccer player activity prediction model using an internet of things-assisted wearable system
  30. Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices
  31. Artificial intelligence on economic evaluation of energy efficiency and renewable energy technologies
  32. Effect of environmental and social responsibility in energy-efficient management models for smart cities infrastructure
  33. Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
  34. GCACS-IoD: A certificate based generic access control scheme for Internet of drones
  35. COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking
  36. Guest editorial of the special issue “remote sensing in water management and hydrology”
  37. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
  38. BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
  39. Public key encryption with equality test for Industrial Internet of Things system in cloud computing
  40. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications
  41. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  42. A Comparative Study of Energy Retaining Objective Functions in RPL for Improving Network Lifetime in IoT Environment
  43. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
  44. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
  45. A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification
  46. A lightweight machine learning-based authentication framework for smart IoT devices
  47. Security analysis on “mutual authentication scheme for multimedia medical information systems”
  48. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  49. Bio-inspired cryptosystem with DNA cryptography and neural networks
  50. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
  51. An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems
  52. Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service
  53. Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks
  54. An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
  55. RETRACTED ARTICLE: Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization
  56. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES
  57. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
  58. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
  59. Introduction to the special section on Big data and IoT in e-healthcare
  60. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
  61. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
  62. Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
  63. Modification of AES using genetic algorithms for high-definition image encryption
  64. Consistent and effective energy utilisation of node model for securing data in wireless sensor networks
  65. Design and analysis of smart card-based authentication scheme for secure transactions
  66. Introduction to the special section on Big data and IoT in e-healthcare
  67. Labelled decision-making method based on neural network model and pruning algorithm
  68. A New Malware Detection System Using Machine Learning Techniques for API Call Sequences
  69. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
  70. An efficient secure communication for healthcare system using wearable devices
  71. Preface
  72. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
  73. CT and MRI Image Fusion Based on Discrete Wavelet Transform and Type-2 Fuzzy Logic
  74. Comparative study of cloud platforms to develop a Chatbot
  75. An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion
  76. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
  77. Adaptive new top-hat transform and multi-scale sequential toggle operator based infrared image enhancement
  78. Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
  79. Secure Protocol for Subscriber Identity Module
  80. Wireless and Mobile Networks: Security and Privacy Issues
  81. Security on “A Lightweight Authentication Scheme with User Untraceability”
  82. Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”
  83. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
  84. A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
  85. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
  86. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
  87. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
  88. Security problems of a “more secure remote user authentication scheme”
  89. Remote user authentication scheme using smart card: a review
  90. Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
  91. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
  92. A secure remote user mutual authentication scheme using smart cards
  93. Cryptanalysis of oPass
  94. Scalable and secure data sharing for dynamic groups in cloud
  95. An efficient technique for preventing SQL injection attack using pattern matching algorithm
  96. The impact of Universal Active Surveillance for MRSA and cohorting on MRSA infections