All Stories

  1. Probably Secure PUF-Based Anonymous Mutual and Batch Authentication for Inter-Vehicular Communications in VANET
  2. Continuous Authentication for Consumer Electronics in Smart City Surveillance
  3. Real-Time Threat Detection and AI-Driven Predictive Security for Consumer Applications
  4. Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface
  5. Scalable computing for large-scale multimedia data analytics
  6. Mitigation of atmospheric losses using dual‐polarized 16‐QAM MIMO technique in free‐space optical system in various weather conditions
  7. Blockchain-Enabled Secure Collaborative Model Learning using Differential Privacy for IoT-Based Big Data Analytics
  8. Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs
  9. Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service
  10. Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
  11. UIoTN‐PMSE: Ubiquitous IoT network‐based predictive modeling in smart environment
  12. PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration
  13. Mobile Application-Based Sign Language Detector for Deaf People
  14. Data Analytics Applications in Healthcare, Hospitality, Marketing, and Security
  15. AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images
  16. A Chaotic System and Count Tracking Mechanism-based Dynamic S-Box and Secret Key Generation
  17. Effective College English Teaching Based on Teacher-student Interactive Model
  18. Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing
  19. Artificial Intelligence-Based Cyber Security Applications
  20. Intelligent Autonomous Drones in Industry 4.0
  21. Comparative Study of Graph Theory for Network System
  22. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
  23. Optimized Learning Strategy Towards Research-LED Teaching Curriculum Development
  24. College music education and teaching based on AI techniques
  25. Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
  26. Content-Based Music Recommendation Using Non-Stationary Bayesian Reinforcement Learning
  27. Blockchain architecture, taxonomy, challenges, and applications
  28. Blockchain for digital rights management
  29. Blockchain for intrusion detection systems
  30. Contributors
  31. Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques
  32. Optimized Tree Strategy with Principal Component Analysis Using Feature Selection-Based Classification for Newborn Infant’s Jaundice Symptoms
  33. Soccer player activity prediction model using an internet of things-assisted wearable system
  34. Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices
  35. Artificial intelligence on economic evaluation of energy efficiency and renewable energy technologies
  36. Effect of environmental and social responsibility in energy-efficient management models for smart cities infrastructure
  37. Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
  38. GCACS-IoD: A certificate based generic access control scheme for Internet of drones
  39. COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking
  40. Guest editorial of the special issue “remote sensing in water management and hydrology”
  41. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
  42. BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
  43. Public key encryption with equality test for Industrial Internet of Things system in cloud computing
  44. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications
  45. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  46. A Comparative Study of Energy Retaining Objective Functions in RPL for Improving Network Lifetime in IoT Environment
  47. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
  48. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
  49. A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification
  50. A lightweight machine learning-based authentication framework for smart IoT devices
  51. Security analysis on “mutual authentication scheme for multimedia medical information systems”
  52. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  53. Bio-inspired cryptosystem with DNA cryptography and neural networks
  54. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
  55. An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems
  56. Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service
  57. Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks
  58. An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
  59. RETRACTED ARTICLE: Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization
  60. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES
  61. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
  62. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
  63. Introduction to the special section on Big data and IoT in e-healthcare
  64. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
  65. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
  66. Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
  67. Modification of AES using genetic algorithms for high-definition image encryption
  68. Consistent and effective energy utilisation of node model for securing data in wireless sensor networks
  69. Design and analysis of smart card-based authentication scheme for secure transactions
  70. Introduction to the special section on Big data and IoT in e-healthcare
  71. Labelled decision-making method based on neural network model and pruning algorithm
  72. A New Malware Detection System Using Machine Learning Techniques for API Call Sequences
  73. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
  74. An efficient secure communication for healthcare system using wearable devices
  75. Preface
  76. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
  77. CT and MRI Image Fusion Based on Discrete Wavelet Transform and Type-2 Fuzzy Logic
  78. Comparative study of cloud platforms to develop a Chatbot
  79. An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion
  80. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
  81. Adaptive new top-hat transform and multi-scale sequential toggle operator based infrared image enhancement
  82. Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
  83. Secure Protocol for Subscriber Identity Module
  84. Wireless and Mobile Networks: Security and Privacy Issues
  85. Security on “A Lightweight Authentication Scheme with User Untraceability”
  86. Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”
  87. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
  88. A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
  89. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
  90. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
  91. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
  92. Security problems of a “more secure remote user authentication scheme”
  93. Remote user authentication scheme using smart card: a review
  94. Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
  95. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
  96. A secure remote user mutual authentication scheme using smart cards
  97. Cryptanalysis of oPass
  98. Scalable and secure data sharing for dynamic groups in cloud
  99. An efficient technique for preventing SQL injection attack using pattern matching algorithm
  100. The impact of Universal Active Surveillance for MRSA and cohorting on MRSA infections