


Остановите войну!
for scientists:


default search action
IEEE Transactions on Industrial Informatics, Volume 19
Volume 19, Number 1, January 2023
- Yue Zhuo, Zhenqin Yin
, Zhiqiang Ge
:
Attack and Defense: Adversarial Security of Data-Driven FDC Systems. 5-19 - Yanjiao Chen
, Xiaotian Zhu, Xueluan Gong
, Xinjing Yi, Shuyang Li:
Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions. 20-28 - Jingxin Zhang
, Donghua Zhou
, Maoyin Chen
:
Self-Learning Sparse PCA for Multimode Process Monitoring. 29-39 - Chao Jiang
, Yusheng Lu
, Weimin Zhong
, Biao Huang
, Dayu Tan
, Wenjiang Song
, Feng Qian
:
Deep Bayesian Slow Feature Extraction With Application to Industrial Inferential Modeling. 40-51 - Felipe Arraño-Vargas
, Georgios Konstantinou
:
Modular Design and Real-Time Simulators Toward Power System Digital Twins Implementation. 52-61 - Xin Liu
, Jian Yang, Wenshuo Li
, Panpan Huang, Lei Guo
:
Tightly Coupled Modeling and Reliable Fusion Strategy for Polarization-Based Attitude and Heading Reference System. 62-73 - Runqi Chai
, Antonios Tsourdos
, Senchun Chai
, Yuanqing Xia
, Al Savvaris, C. L. Philip Chen
:
Multiphase Overtaking Maneuver Planning for Autonomous Ground Vehicles Via a Desensitized Trajectory Optimization Approach. 74-87 - Hang Yu
, Kwan-Wu Chin
:
Learning Algorithms for Data Collection in RF-Charging IIoT Networks. 88-97 - Jinli Zhao, Ziqi Zhang, Hao Yu
, Haoran Ji
, Peng Li
, Wei Xi
, Jinyue Yan
, Chengshan Wang
:
Cloud-Edge Collaboration-Based Local Voltage Control for DGs With Privacy Preservation. 98-108 - Qingmian Chai
, Cuo Zhang
, Ziyuan Tong, Shuai Lu
, Wen Chen, Zhao Yang Dong
:
PV Inverter Reliability Constrained Volt/Var Control With Power Smoothing via a Convex-Concave Programming Method. 109-120 - Shiguang Wu
, Zhiqiang Pu
, Tenghai Qiu, Jianqiang Yi
, Tianle Zhang
:
Deep-Reinforcement-Learning-Based Multitarget Coverage With Connectivity Guaranteed. 121-132 - Yachao Zhang
, Shiwei Xie
, Shengwen Shu
:
Decentralized Optimization of Multiarea Interconnected Traffic-Power Systems With Wind Power Uncertainty. 133-143 - Mohammed Abdulaziz Aide Al-qaness
, Abdelghani Dahou
, Mohamed Abd Elaziz
, Ahmed Helmi
:
Multi-ResAtt: Multilevel Residual Network With Attention for Human Activity Recognition Using Wearable Sensors. 144-152 - Ahmed S. Musleh
, Guo Chen
, Zhao Yang Dong
, Chen Wang
, Shiping Chen
:
Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders. 153-165 - Xiaoli Zhao
, Jianyong Yao
, Wenxiang Deng
, Peng Ding
, Jichao Zhuang
, Zheng Liu
:
Multiscale Deep Graph Convolutional Networks for Intelligent Fault Diagnosis of Rotor-Bearing System Under Fluctuating Working Conditions. 166-176 - Chensheng Liu
, Wangli He
, Ruilong Deng
, Yu-Chu Tian
, Wenli Du
:
False-Data-Injection-Enabled Network Parameter Modifications in Power Systems: Attack and Detection. 177-188 - Zhiyuan Chen
, Xiangyang Xing
, Xiaoyan Li
, Xianzhe Pang, Chenghui Zhang
:
The Zero-Sequence Circulating Current Suppression Method for Parallel Three-Level Rectifiers System Under the Open-Circuit Fault of Neutral-Point Switches. 189-199 - Issam A. Smadi
, Haya Altabbal, Bayan H. Bany Fawaz:
A Phase-Locked Loop With Inherent DC Offset Rejection for Single-Phase Applications. 200-209 - Muhammad Zohaib Hassan Shah
, Zahoor Ahmed
, Hu Lisheng:
Weighted Linear Local Tangent Space Alignment via Geometrically Inspired Weighted PCA for Fault Detection. 210-219 - Sarah M. Azzam
, Tallal Elshabrawy
, Mohamed Ashour:
A Bi-Level Framework for Supply and Demand Side Energy Management in an Islanded Microgrid. 220-231 - Weihua Liu
, Yuanming Zhang
, Xinghu Yu
:
A Novel Subpixel Industrial Chip Detection Method Based on the Dual-Edge Model for Surface Mount Equipment. 232-242 - Bakkiam David Deebak
, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja
, Weizheng Wang
, Nawab Muhammad Faseeh Qureshi
:
TAB-SAPP: A Trust-Aware Blockchain-Based Seamless Authentication for Massive IoT-Enabled Industrial Applications. 243-250 - Kaixiang Yang
, Yifan Shi
, Zhiwen Yu
, Qinmin Yang
, Arun Kumar Sangaiah
, Huanqiang Zeng
:
Stacked One-Class Broad Learning System for Intrusion Detection in Industry 4.0. 251-260 - Zongyuan Ding
, Tao Wang
, Quansen Sun
, Fuhua Chen
:
Rethinking Click Embedding for Deep Interactive Image Segmentation. 261-273 - Moloud Abdar
, Mohammad Amin Fahami
, Leonardo Rundo
, Petia Radeva
, Alejandro F. Frangi
, U. Rajendra Acharya
, Abbas Khosravi
, Hak-Keung Lam
, Alexander Jung
, Saeid Nahavandi
:
Hercules: Deep Hierarchical Attentive Multilevel Fusion Model With Uncertainty Quantification for Medical Image Classification. 274-285 - Ons Aouedi
, Kandaraj Piamrat
, Guillaume Muller
, Kamal Deep Singh
:
Federated Semisupervised Learning for Attack Detection in Industrial Internet of Things. 286-295 - Hasan Asy'ari Arief
, Peter James Thomas, Tomasz Wiktorski
:
Better Modeling Out-of-Distribution Regression on Distributed Acoustic Sensor Data Using Anchored Hidden State Mixup. 296-305 - He Li
, Shihui Zhang
, Weihang Kong
:
RGB-D Crowd Counting With Cross-Modal Cycle-Attention Fusion and Fine-Coarse Supervision. 306-316 - Yong Zhang
, Ping Zhou
, Donghao Lv
, Sen Zhang
, Guimei Cui, Hong Wang:
Inverse Calculation of Burden Distribution Matrix Using B-Spline Model Based PDF Control in Blast Furnace Burden Charging Process. 317-327 - Junjie Jiang
, Zaixing He
, Xinyue Zhao
, Shuyou Zhang
, Chenrui Wu
, Yang Wang
:
REG-Net: Improving 6DoF Object Pose Estimation With 2D Keypoint Long-Short-Range-Aware Registration. 328-338 - Tripti Gangwar
, Narayana Prasad Padhy, Premalata Jena
:
Storage Allocation in Active Distribution Networks Considering Life Cycle and Uncertainty. 339-350 - Dajun Du
, Changda Zhang
, Xue Li
, Minrui Fei
, Huiyu Zhou
:
Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking. 351-361 - Heshou Wang
, Ka Wai Eric Cheng
:
Analysis, Design, and Validation of a Decoupled Double-Receiver Wireless Power Transfer System With Constant Voltage Outputs for Industrial Power Supplies. 362-370 - Amirhossein Ahmadi
, Mojtaba Nabipour
, Saman Taheri
, Behnam Mohammadi-Ivatloo
, Vahid Vahidinasab
:
A New False Data Injection Attack Detection Model for Cyberattack Resilient Energy Forecasting. 371-381 - Jianwen Sun
, Lu Gao, Xiaoxuan Shen
, Sannyuya Liu, Ruxia Liang, Shangheng Du, Shengyingjie Liu:
Separated Graph Neural Networks for Recommendation Systems. 382-393 - Yan Zhang
, Guojiang Shen
, Xiao Han
, Wei Wang
, Xiangjie Kong
:
Spatio-Temporal Digraph Convolutional Network-Based Taxi Pickup Location Recommendation. 394-403 - Binyi Su
, Zhong Zhou
, Haiyong Chen
:
PVEL-AD: A Large-Scale Open-World Dataset for Photovoltaic Cell Anomaly Detection. 404-413 - Dimas A. Schuetz
, Caio Ruviaro Dantas Osório
, Luiz Antonio Maccari
, Daniel Martins Lima
, Fernanda de M. Carnielutti
, Vinicius Foletto Montagner
, Humberto Pinheiro
:
Space Vector Modulated Model Predictive Control for Grid-Tied Converters. 414-425 - Ruiqi Jiang
, Shaoxiong Zeng
, Qing Song, Zhou Wu
:
Deep-Chain Echo State Network With Explainable Temporal Dependence for Complex Building Energy Prediction. 426-435 - Keke Huang
, Shijun Tao, Dehao Wu
, Chunhua Yang
, Weihua Gui
, Shiyan Hu
:
Trustworthiness of Process Monitoring in IIoT Based on Self-Weighted Dictionary Learning. 436-446 - Zhe Chen
, Shiqing Tian
, Xiaotao Shi, Huimin Lu
:
Multiscale Shared Learning for Fault Diagnosis of Rotating Machinery in Transportation Infrastructures. 447-458 - Tiange Wang
, Zijun Zhang
, Kwok-Leung Tsui
:
A Deep Generative Approach for Rail Foreign Object Detections via Semisupervised Learning. 459-468 - Haoyang Yan
, Zhiyong Cui
, Xinqiang Chen
, Xiaolei Ma
:
Distributed Multiagent Deep Reinforcement Learning for Multiline Dynamic Bus Timetable Optimization. 469-479 - Xingxia Dai
, Zhu Xiao
, Hongbo Jiang
, Mamoun Alazab
, John C. S. Lui
, Schahram Dustdar
, Jiangchuan Liu
:
Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things. 480-490 - Junhuai Li
, Ruijie Wang
, Kan Wang
:
Service Function Chaining in Industrial Internet of Things With Edge Intelligence: A Natural Actor-Critic Approach. 491-502 - Ship Peng Xu
, Ke Wang
, Md. Rafiul Hassan, Mohammad Mehedi Hassan
, Chien-Ming Chen
:
An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems. 503-510 - Rahim Khan
, Jason Teo
, Mian Ahmad Jan
, Sahil Verma
, Ryan Alturki
, Abdullah Gani
:
A Trustworthy, Reliable, and Lightweight Privacy and Data Integrity Approach for the Internet of Things. 511-518 - Tharaka Hewa
, Pawani Porambage
, Ivana Kovacevic
, Nisita Weerasinghe
, Erkki Harjula
, Madhusanka Liyanage
, Mika Ylianttila
:
Blockchain-Based Network Slice Broker to Facilitate Factory-As-a-Service. 519-530 - Zhuoran Lu
, Yingjie Wang
, Xiangrong Tong
, Chunxiao Mu, Yu Chen, Yingshu Li
:
Data-Driven Many-Objective Crowd Worker Selection for Mobile Crowdsourcing in Industrial IoT. 531-540 - Fanhui Kong
, Jianqiang Li
, Bin Jiang
, Huihui Wang
, Houbing Song
:
Integrated Generative Model for Industrial Anomaly Detection via Bidirectional LSTM and Attention Mechanism. 541-550 - Yen-Ting Chen, Chia-Yi Hsu, Chia-Mu Yu
, Mahmoud Barhamgi
, Charith Perera:
On the Private Data Synthesis Through Deep Generative Models for Data Scarcity of Industrial Internet of Things. 551-560 - Xingjuan Cai
, Yang Lan, Zhixia Zhang, Jie Wen, Zhihua Cui
, Wensheng Zhang
:
A Many-Objective Optimization Based Federal Deep Generation Model for Enhancing Data Processing Capability in IoT. 561-569 - Xiaokang Zhou
, Yiyong Hu
, Jiayi Wu, Wei Liang
, Jianhua Ma, Qun Jin
:
Distribution Bias Aware Collaborative Generative Adversarial Network for Imbalanced Deep Learning in Industrial IoT. 570-580 - Chinmay Chakraborty
, João Manuel R. S. Tavares
, Shaohua Wan, Houbing Herbert Song
:
Guest Editorial: Augmented Intelligence of Things for Smart Enterprise Systems. 581-585 - Rahul Mishra
, Hari Prabhat Gupta
, Ramakant Kumar
, Tanima Dutta
:
Leveraging Augmented Intelligence of Things to Enhance Lifetime of UAV-Enabled Aerial Networks. 586-593 - Guangsheng Chen, Weitao Zou
, Weipeng Jing
, Wei Wei
, Rafal Scherer
:
Improving the Efficiency of the EMS-Based Smart City: A Novel Distributed Framework for Spatial Data. 594-604 - Yanchen Qiao
, Weizhe Zhang
, Zhicheng Tian, Laurence T. Yang
, Yang Liu
, Mamoun Alazab
:
Adversarial ELF Malware Detection Method Using Model Interpretation. 605-615 - Jing Yang
, Laurence Tianruo Yang
, Hao Wang, Yuan Gao
:
Multirelational Tensor Graph Attention Networks for Knowledge Fusion in Smart Enterprise Systems. 616-625 - Sushil Kumar Singh
, Jong Hyuk Park
:
TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence. 626-634 - Yuwen Liu
, Huiping Wu, Khosro Rezaee
, Mohammad Reza Khosravi, Osamah Ibrahim Khalaf, Arif Ali Khan, Dharavath Ramesh
, Lianyong Qi
:
Interaction-Enhanced and Time-Aware Graph Convolutional Network for Successive Point-of-Interest Recommendation in Traveling Enterprises. 635-643 - Hao Ran Chi
, Ayman Radwan
:
Fully-Decentralized Fairness-Aware Federated MEC Small-Cell Peer-Offloading for Enterprise Management Networks. 644-652 - Long Chen, Lingyan Xue
, Haiping Huang
, Wenming Wang
, Mengxun Cao, Fu Xiao
:
Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things. 653-661 - Xingxia Dai
, Zhu Xiao
, Hongbo Jiang
, Mamoun Alazab
, John C. S. Lui
, Geyong Min
, Schahram Dustdar
, Jiangchuan Liu
:
Task Offloading for Cloud-Assisted Fog Computing With Dynamic Service Caching in Enterprise Management Systems. 662-672 - Zheng Li
, Muhammad Bilal
, Xiaolong Xu
, Jielin Jiang, Yan Cui:
Federated Learning-Based Cross-Enterprise Recommendation With Graph Neural Networks. 673-682 - Mohammed M. Alani
, Ali Ismail Awad
:
An Intelligent Two-Layer Intrusion Detection System for the Internet of Things. 683-692 - Peng Li
, Asif Ali Laghari
, Mamoon Rashid
, Jing Gao
, Thippa Reddy Gadekallu
, Abdul Rehman Javed
, Shoulin Yin
:
A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System. 693-702 - Sanjay Kumar
, Akshi Kumar
, B. S. Panda:
Identifying Influential Nodes for Smart Enterprises Using Community Structure With Integrated Feature Ranking. 703-711 - Yang Shi
, Stamatis Karnouskos
, Thilo Sauter
, Huazhen Fang
:
Guest Editorial: New Advancements in Industrial Cyber-Physical Systems. 712-715 - Kunwu Zhang
, Yang Shi
, Stamatis Karnouskos
, Thilo Sauter
, Huazhen Fang
, Armando Walter Colombo
:
Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives. 716-729 - Jing Chen
, Yuan Tian, Guangbo Zhang, Zhengtao Cao, Lingling Zhu, Dawei Shi
:
IoT-Enabled Intelligent Dynamic Risk Assessment of Acute Mountain Sickness: The Role of Event-Triggered Signal Processing. 730-738 - Kaja Balzereit
, Oliver Niggemann
:
AutoConf: New Algorithm for Reconfiguration of Cyber-Physical Production Systems. 739-749 - Xiang Huo
, Mingxi Liu
:
Encrypted Decentralized Multi-Agent Optimization for Privacy Preservation in Cyber-Physical Systems. 750-761 - Guangxing Niu
, Enhui Liu
, Xuan Wang
, Paul Ziehl, Bin Zhang
:
Enhanced Discriminate Feature Learning Deep Residual CNN for Multitask Bearing Fault Diagnosis With Information Fusion. 762-770 - Jiamin Xu
, Haobin Ke, Zhiwen Chen
, Xinyu Fan
, Tao Peng
, Chunhua Yang
:
Oversmoothing Relief Graph Convolutional Network-Based Fault Diagnosis Method With Application to the Rectifier of High-Speed Trains. 771-779 - Fang Fang
, Jiayu Li, Yajuan Liu
, Ju H. Park
:
Resilient Control for Multiagent Systems With a Sampled-Data Model Against DoS Attacks. 780-789 - Li Qiu
, Longcheng Dai
, Usama Ahsan
, Chen Fang
, Marzieh Najariyan
, Jian Fei Pan
:
Model Predictive Control for Networked Multiple Linear Motors System Under DoS Attack and Time Delay. 790-799 - Jiang Wei
, Dan Ye
:
Multisensor Scheduling for Remote State Estimation Over a Temporally Correlated Channel. 800-808 - Ashish Singh
, Abhinav Kumar
, Zahid Akhtar
, Muhammad Khurram Khan
:
Guest Editorial: Cybersecurity Intelligence in the Healthcare System. 809-812 - Khosro Rezaee
, Hossein Ghayoumi Zadeh
, Chinmay Chakraborty
, Mohammad Reza Khosravi
, Gwanggil Jeon
:
Smart Visual Sensing for Overcrowding in COVID-19 Infected Cities Using Modified Deep Transfer Learning. 813-820 - Sangjukta Das
, Suyel Namasudra
:
Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure. 821-829 - Preeti Soni
, Jitesh Pradhan
, Arup Kumar Pal
, SK Hafizul Islam
:
Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System. 830-840 - Yang Li
, Jiachen Yang
, Zhuo Zhang
, Jiabao Wen
, Prabhat Kumar
:
Healthcare Data Quality Assessment for Cybersecurity Intelligence. 841-848 - Ashima Anand
, Amit Kumar Singh
, Huiyu Zhou
:
ViMDH: Visible-Imperceptible Medical Data Hiding for Internet of Medical Things. 849-856 - Huadong Liu
, Tianlong Gu
, Mohammad Shojafar
, Mamoun Alazab
, Yi-Ning Liu
:
OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems. 857-866 - Prosanta Gope
, Biplab Sikdar
, Neetesh Saxena
:
Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges. 867-869 - Mu-Yen Chen
, Hsin-Te Wu
:
An Automatic-Identification-System-Based Vessel Security System. 870-879 - Seyed Ahmad Soleymani
, Shidrokh Goudarzi, Mohammad Hossein Anisi
, Haitham S. Cruickshank
, Anish Jindal
, Nazri Kama
:
TRUTH: Trust and Authentication Scheme in 5G-IIoT. 880-889 - Sunder Ali Khowaja
, Parus Khuwaja
, Kapal Dev
, Ikhyun Lee
, Wali Ullah Khan
, Weizheng Wang
, Nawab Muhammad Faseeh Qureshi
, Maurizio Magarini
:
A Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G. 890-899 - Chao Qiu
, Gagangeet Singh Aujla
, Jing Jiang
, Wu Wen, Peiying Zhang
:
Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT Using Proof of Learning Consensus Protocol. 900-909 - Laizhong Cui
, Jiating Ma
, Yipeng Zhou
, Shui Yu
:
Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses. 910-920 - Moemedi Lefoane
, Ibrahim Ghafir, Sohag Kabir
, Irfan-Ullah Awan:
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks. 921-929 - Yaguang Lin
, Xiaoming Wang
, Hongguang Ma
, Liang Wang, Fei Hao
, Zhipeng Cai
:
An Efficient Approach to Sharing Edge Knowledge in 5G-Enabled Industrial Internet of Things. 930-939 - Ta Li, Youliang Tian
, Jinbo Xiong
, Md. Zakirul Alam Bhuiyan
:
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT. 940-950 - Syed Atif Moqurrab
, Adeel Anjum
, Noshina Tariq
, Gautam Srivastava
:
Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT. 951-959 - Husnain Rafiq
, Nauman Aslam
, Usman Ahmed
, Jerry Chun-Wei Lin
:
Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things. 960-968 - Md. Zakirul Alam Bhuiyan
, Sy-Yen Kuo
, Guojun Wang
:
Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications. 969-972 - Qiwei Xie
, Xiyuan Hu
, Lei Ren
, Lianyong Qi
, Zhao Sun
:
A Binocular Vision Application in IoT: Realtime Trustworthy Road Condition Detection System in Passable Area. 973-983 - Xintao Ding
, Yongqiang Cheng
, Yonglong Luo
, Qingde Li
, Prosanta Gope
:
Consensus Adversarial Defense Method Based on Augmented Examples. 984-994 - Mohamed Abdel-Basset
, Nour Moustafa
, Hossam Hawash
:
Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach. 995-1005 - Sk. Tanzir Mehedi
, Adnan Anwar
, Ziaur Rahman
, Kawsar Ahmed
, Rafiqul Islam
:
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach. 1006-1017 - Zhe Li
, Honglong Chen
, Zhichen Ni
, Xiaogang Deng
, Baodi Liu, Weifeng Liu
:
ARPCNN: Auxiliary Review-Based Personalized Attentional CNN for Trustworthy Recommendation. 1018-1029 - Fazlullah Khan
, Ryan Alturki
, Md. Arafatur Rahman
, Spyridon Mastorakis
, Imran Razzak
, Syed Tauhid Ullah Shah:
Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT. 1030-1038 - Pedram Asef
, Rahim Taheri
, Mohammad Shojafar
, Iosif Mporas
, Rahim Tafazolli
:
SIEMS: A Secure Intelligent Energy Management System for Industrial IoT Applications. 1039-1050 - Ashima Anand
, Amit Kumar Singh
:
A Hybrid Optimization-Based Medical Data Hiding Scheme for Industrial Internet of Things Security. 1051-1058 - Geetanjali Rathee
, Sahil Garg
, Georges Kaddoum
, Bong Jun Choi
, Mohammad Mehedi Hassan
, Salman A. AlQahtani
:
TrustSys: Trusted Decision Making Scheme for Collaborative Artificial Intelligence of Things. 1059-1068 - Zhaoyang Wang
, Song Wang
, Zhiyao Zhao
, Muyi Sun
:
Trustworthy Localization With EM-Based Federated Control Scheme for IIoTs. 1069-1079 - Jafar Ahmad Abed Alzubi, Omar A. Alzubi
, Ashish Singh
, Manikandan Ramachandran
:
Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning. 1080-1087 - Xu Zheng
, Ling Tian
, Zhipeng Cai
:
A Fair and Rational Data Sharing Strategy Toward Two-Stage Industrial Internet of Things. 1088-1096 - Tao Zhang
, Changqiao Xu
, Ping Zou, Haijiang Tian
, Xiaohui Kuang, Shujie Yang, Lujie Zhong
, Dusit Niyato
:
How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach. 1097-1106 - Zhibin Yang
, Linquan Xing, Zonghua Gu
, Yingmin Xiao, Yong Zhou, Zhiqiu Huang
, Lei Xue:
Model-Based Reinforcement Learning and Neural-Network-Based Policy Compression for Spacecraft Rendezvous on Resource-Constrained Embedded Systems. 1107-1116