• An Optimized Implementation of Speech Recognition Combining GPU with Deep Belief Network for IoT

  • An IoT Platform for Smart Plant Care

  • A Study on Online Corrosion Risk Perception Technology for Process Industry Safety IoTs Based on Demands of Assets Integrity Management

  • Medical Internet of Things and Legal Issues Regarding Cybersecurity

  • Lightweight, Low-Rate Denial-of-Service Attack Prevention and Control Program for IoT Devices

  • Multiple User Activities Recognition in Smart Home

  • ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings

  • Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

  • How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning

  • FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

  • Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus

  • A SAR Image Fast Stitching Algorithm Based on Machine Learning

  • Highly-Available Localization Techniques in Indoor Wi-Fi Environment: A Comprehensive Survey

  • Optimize Bundle Size in Satellite DTN Links with Markov Method

  • An Improved Quadratic Programming LLOP Algorithm for Wireless Localization

  • A Dual SIS Epidemic Model for Virus Spread Analysis in Cluster-Based Wireless Sensor Networks

  • Communication-Efficient Decentralized Cooperative Data Analytics in Sensor Networks

  • Study of Radar Target Range Profile Recognition Algorithm Based on Optimized Neural Network

  • The Design of Inter-satellite Link Topology Based on Time-Slot Allocation Technology

  • Performance Evaluation of Ad-hoc Routing Protocols in Hybrid MANET-Satellite Network

  • Improved RSA Localization Based on the Lagrange Multiplier Optimization

  • MOPSO Optimized Radar CBMeMBer Forward-Backward Smoothing Filter

  • Joint Time and Power Allocations for Uplink Nonorthogonal Multiple Access Networks

  • An Efficient Method for Estimating Time Series Motif Length Using Sequitur Algorithm

  • Detecting Phishing Websites with Random Forest