Issue Date | Title | Author(s) |
2010-11-19 | Accuracy enhancement for license plate recognition | Zheng, L; He, X; Samali, B; Yang, LT |
2018-09-04 | Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels | Bhoi, SK; Puthal, D; Khilar, PM; Rodrigues, JJPC; Panda, SK; Yang, LT |
2013-03-01 | An algorithm for accuracy enhancement of license plate recognition | Zheng, L; He, X; Samali, B; Yang, LT |
2020-01-01 | An Open Identity Authentication Scheme Based on Blockchain | Chen, Y; Dong, G; Hao, Y; Zhang, Z; Peng, H; Yu, S; Wen, S; Zomaya, A; Yang, LT |
2019-02-01 | Analytical Model for Sybil Attack Phases in Internet of Things | Mishra, AK; Tripathy, AK; Puthal, D; Yang, LT |
2018-09-01 | Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services | Wang, W; Xu, P; Yang, LT; Chen, J |
2011-01 | Connceptualization of a Context Aware Cloud Adaptation (CACA) Framework | Gill, AQ; Bunker, D; Chen, J; Dou, W; Liu, J; Yang, LT; Ma, J |
2020-04-01 | Energy Management for Cyber-Physical Cloud Systems | Kumar, N; Vasilakos, AV; Choo, KKR; Yang, LT |
2022-07-01 | Guest Editorial: Trust, Security and Privacy of 6G | Yan, Z; Yang, LT; Li, T; Miche, Y; Yu, S; Yau, SS |
2018-04-01 | A Holistic Approach for Distributed Dimensionality Reduction of Big Data | Kuang, L; Yang, LT; Chen, J; Hao, F; Luo, C |
2020-04-01 | HostWatcher: Protecting hosts in cloud data centers through software-defined networking | Yuan, B; Zou, D; Jin, H; Yu, S; Yang, LT |
2017-05-01 | Message from GreenCom 2016 Steering Committee | Yang, LT; Wu, J; Ma, J; Chen, J; Honggang, Z |
2020-10-01 | Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management | Yuan, B; Zhao, H; Lin, C; Zou, D; Yang, LT; Jin, H; He, L; Yu, S |
2018-06-01 | A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks | Yuan, B; Jin, H; Zou, D; Yang, LT; Yu, S |
2018-09-01 | Response time optimization for cloudlets in Mobile Edge Computing | Tiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT |
2019-03-20 | S2R: Service trading based response time optimization in mobile edge computing | Mishra, P; Tiwary, M; Yang, LT; Puthal, D |
2016-01-01 | A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud | Puthal, D; Nepal, S; Ranjan, R; Chen, J; Chen, J; Yang, LT |
2017-01-01 | Securely reinforcing synchronization for embedded online contests | Wang, W; Xu, P; Yang, LT; Susilo, W; Chen, J |
2020-08-01 | Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges | Nanda, P; He, X; Yang, LT |
2019-07-01 | Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks | Fu, C; Liu, XY; Yang, J; Yang, LT; Yu, S; Zhu, T |