default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 98 matches
- 2025
- Dalin He, Huanyu Wang, Tuo Deng, Jishi Liu, Junnian Wang:
Improving IIoT security: Unveiling threats through advanced side-channel analysis. Comput. Secur. 148: 104135 (2025) - 2024
- Masahiro Shiomi, Daisuke Sakamoto, Takamasa Iio, Martin Cooney, Jun Baba, Mitsuhiko Kimoto, Leimin Tian:
Special issue on social interaction with more than one robot. Adv. Robotics 38(7): 439 (2024) - Danfeng Sun, Junjie Hu, Huifeng Wu, Jia Wu, Jian Yang, Quan Z. Sheng, Schahram Dustdar:
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT. ACM Comput. Surv. 56(2): 50:1-50:37 (2024) - Libo Feng, Fei Qiu, Kai Hu, Bei Yu, Junyu Lin, Shaowen Yao:
CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT. Future Gener. Comput. Syst. 158: 516-529 (2024) - Lianpeng Li, Xu Zhao, Junfang Fan, Fuchao Liu, Ning Liu, Hui Zhao:
A trustworthy security model for IIoT attacks on industrial robots. Future Gener. Comput. Syst. 153: 340-349 (2024) - Zitian Huang, Huanyu Wang, Bijia Cao, Dalin He, Junnian Wang:
A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT. Internet Things 27: 101331 (2024) - Wen Gu, Yang Liu, Cheng-Xiang Wang, Wenchao Xu, Yu Yu, Wen-Jun Lu, Hongbo Zhu:
A General 3-D Geometry-Based Stochastic Channel Model for B5G mmWave IIoT. IEEE Internet Things J. 11(2): 3362-3376 (2024) - Tianle Liu, Haiquan Wang, Jun Tong, Peng Pan, Anzhong Hu, Tengjiao He:
Novel AMUB Sequences for Massive Connection IIoT Systems. IEEE Internet Things J. 11(16): 26645-26655 (2024) - Jun Iio:
An Evaluation of the Flipped Classroom Approach Toward Programming Education. J. Inf. Process. 32: 159-165 (2024) - Yudian Huang, Meng Li, F. Richard Yu, Pengbo Si, Haijun Zhang, Junfei Qiao:
Resources Scheduling for Ambient Backscatter Communication-Based Intelligent IIoT: A Collective Deep Reinforcement Learning Method. IEEE Trans. Cogn. Commun. Netw. 10(2): 634-648 (2024) - Mahammad Shareef Mekala, Gaurav Dhiman, Ju H. Park, Ho-Youl Jung, Wattana Viriyasitavat:
ASXC${2}$ Approach: A Service-X Cost Optimization Strategy Based on Edge Orchestration for IIoT. IEEE Trans. Ind. Informatics 20(3): 4347-4359 (2024) - Dewen Qiao, Mingyan Li, Songtao Guo, Jun Zhao, Bin Xiao:
Resources-Efficient Adaptive Federated Learning for Digital Twin-Enabled IIoT. IEEE Trans. Netw. Sci. Eng. 11(4): 3639-3652 (2024) - Libo Feng, Junyu Lin, Fei Qiu, Bei Yu, Zhihua JIn, Jinli Wang, Jing Cheng, Shaowen Yao:
SDAC-BBPP: A Secure Dynamic Access Control Scheme With Blockchain-Based Privacy Protection for IIoT. IEEE Trans. Netw. Serv. Manag. 21(3): 3179-3193 (2024) - Jiale Xie, Libo Feng, Fake Fang, Zehui Yuan, Xian Deng, Junhong Liu, Peng Wu, Zhuo Li:
A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOT. CSCWD 2024: 2442-2447 - Xiumei Deng, Jun Li, Long Shi, Kang Wei, Ming Ding, Yumeng Shao, Wen Chen, Shi Jin:
Trustworthy DNN Partition for Blockchain-enabled Digital Twin in Wireless IIoT Networks. CoRR abs/2405.17914 (2024) - Jixuan Cui, Jun Li, Zhen Mei, Yiyang Ni, Wen Chen, Zengxiang Li:
Adversarial Federated Consensus Learning for Surface Defect Classification Under Data Heterogeneity in IIoT. CoRR abs/2409.15711 (2024) - 2023
- Qiaolun Zhang, Jun Wu, Michele Zanella, Wu Yang, Ali Kashif Bashir, William Fornaciari:
Sema-IIoVT: Emergent Semantic-Based Trustworthy Information-Centric Fog System and Testbed for Intelligent Internet of Vehicles. IEEE Consumer Electron. Mag. 12(1): 70-79 (2023) - Hongcheng Huang, Peixin Ye, Min Hu, Jun Wu:
A multi-point collaborative DDoS defense mechanism for IIoT environment. Digit. Commun. Networks 9(2): 590-601 (2023) - Jun Liu, Kai Qian, Zhibao Qin, Mohammad Dahman Alshehri, Qiong Li, Yonghang Tai:
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access. Digit. Commun. Networks 9(2): 347-357 (2023) - Jun Iio:
How Many Tweets Describe the Topics on TV Programs: An Investigation on the Relation between Twitter and Mass Media. IEICE Trans. Inf. Syst. 106(4): 443-449 (2023) - Jun Feng, Hu Xiong, Jinhao Chen, Yang Xiang, Kuo-Hui Yeh:
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6, March 15): 4815-4829 (2023) - Jun Pei, Ping Yan, Subodha Kumar:
No Permanent Friend or Enemy: Impacts of the IIoT-Based Platform in the Maintenance Service Market. Manag. Sci. 69(11): 6800-6817 (2023) - Xiaoheng Deng, Xinjun Pei, Shengwei Tian, Lan Zhang:
Edge-Based IIoT Malware Detection for Mobile Devices With Offloading. IEEE Trans. Ind. Informatics 19(7): 8093-8103 (2023) - Huaming Wu, Junqi Chen, Tu N. Nguyen, Huijun Tang:
Lyapunov-Guided Delay-Aware Energy Efficient Offloading in IIoT-MEC Systems. IEEE Trans. Ind. Informatics 19(2): 2117-2128 (2023) - Mahnoor Anjum, Muhammad Abdullah Khan, Syed Ali Hassan, Haejoon Jung, Aamir Mahmood, Mikael Gidlund:
A Multi-Level ML-Based Optimization Framework for IIoT Networks with Distributed IRS Assisted UAVs. GLOBECOM (Workshops) 2023: 1338-1343 - Syed Asad Ullah, Shah Zeb, Syed Ali Hassan, Haejoon Jung, Kapal Dev:
Impact of Imperfect CSI on Multiuser MIMO-OFDM-based IIoT Networks: A BER and Capacity Analysis. GLOBECOM 2023: 3789-3794 - Jian Jin, Zhenzhen Jiao, Junsheng Mu, Wenzhe Lv, Yinan Tang, Tongtong Yuan:
Decentralized Communication-assisted Sensing based on Federated Learning Framework for IIoT. ISACom@MobiCom 2023: 37-42 - Yang Li, Qingyang Zhang, Jun Cheng, Yiyuan Zhou, Jie Cui, Hong Zhong:
Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT. NaNA 2023: 332-338 - Jun Iio:
Analysis of Critical Comments onChatGPT. NBiS 2023: 455-463 - 2022
- Carlos Pedroso, Aldri Santos:
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack. Int. J. Netw. Manag. 32(5) (2022)
skipping 68 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-01 04:29 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint