Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Gerard Memmi"'
Publikováno v:
IEEE Internet of Things Journal. 10:6794-6802
Publikováno v:
IEEE Transactions on Cloud Computing. 9:1293-1304
Protection on end users' data stored in Cloud servers becomes an important issue in today's Cloud environments. In this paper, we present a novel data protection method combining Selective Encryption (SE) concept with fragmentation and dispersion on
Publikováno v:
IEEE Internet of Things Journal. 8:3180-3188
The rapid development of deep learning (DL) enables resource-constrained systems and devices [e.g., Internet of Things (IoT)] to perform sophisticated artificial intelligence (AI) applications. However, AI models, such as deep neural networks (DNNs),
Publikováno v:
IEEE Internet of Things Journal
IEEE Internet of Things Journal, 2021, 8 (13), pp.10327-10335. ⟨10.1109/JIOT.2020.3048038⟩
IEEE Internet of Things Journal, 2021, 8 (13), pp.10327-10335. ⟨10.1109/JIOT.2020.3048038⟩
Deep learning (DL) has gained popularity in network intrusion detection, due to its strong capability of recognizing subtle differences between normal and malicious network activities. Although a variety of methods have been designed to leverage DL m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::efa0573a9cb516792b6f7b41326da5a7
https://telecom-paris.hal.science/hal-03559698
https://telecom-paris.hal.science/hal-03559698
Publikováno v:
Information Fusion
Information Fusion, Elsevier, 2019, 50, pp.212-220. ⟨10.1016/j.inffus.2019.02.002⟩
Information Fusion, Elsevier, 2019, 50, pp.212-220. ⟨10.1016/j.inffus.2019.02.002⟩
Data fusion in Vehicle-to-Everything (V2X) networks for different data types coming from different sources is the foundation for decision making in the smart vehicle driving systems. Different communication technologies have been combined to form a h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f1a54c658408e9569b3a837c9225e061
https://hal.telecom-paris.fr/hal-02450299
https://hal.telecom-paris.fr/hal-02450299
Publikováno v:
IEEE Transactions on Industrial Informatics. :1-1
With the development of big data and network technology, there are more use cases, such as edge computing, that require more secure and efficient multimedia big data transmission. Data compression methods can help achieving many tasks like providing