Zobrazeno 1 - 10
of 164
pro vyhledávání: '"Guoai Xu"'
Publikováno v:
Sensors, Vol 23, Iss 21, p 8992 (2023)
In healthcare, wireless body area networks (WBANs) can be used to constantly collect patient body data and assist in real-time medical services for patients from physicians. In such security- and privacy-critical systems, the user authentication mech
Externí odkaz:
https://doaj.org/article/8a8ef835e38c4c7981d43b6f633dd391
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12376 (2023)
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology. With the transmission of these sensitive health data, security a
Externí odkaz:
https://doaj.org/article/acae95dfcae9422da3318686b6fa3093
Publikováno v:
Applied Sciences, Vol 13, Iss 7, p 4425 (2023)
The rapid development of mobile computing (e.g., mobile health, mobile payments, and smart homes) has brought great convenience to our lives. It is well-known that the security and privacy of user information from these applications and services is c
Externí odkaz:
https://doaj.org/article/57db569859b44323b1aa1576069e2ebd
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 18 (2022)
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things. Due to the large
Externí odkaz:
https://doaj.org/article/f0374aa2660b40139881fbd2f2b8e9e4
Publikováno v:
IEEE Access, Vol 8, Pp 47282-47294 (2020)
Wireless medical sensor networks (WMSNs) are playing an increasingly important role in smart healthcare applications. Since the data transmitted in WMSNs is closely related to patient's life and health, and considering the resource-constrain feature
Externí odkaz:
https://doaj.org/article/b709f40d27a14b2a9734dcd62f6e5fe1
Publikováno v:
IEEE Access, Vol 8, Pp 77142-77155 (2020)
App clone is a serious threat to the mobile app ecosystem, which not only damages the benefits of original developers, but also contributes to spreading malware. App clone detection has received extensive attentions from our research community, and a
Externí odkaz:
https://doaj.org/article/38f2611cb1894542ba7b513e81c6c2e2
Publikováno v:
IEEE Access, Vol 8, Pp 124579-124607 (2020)
Android applications are developing rapidly across the mobile ecosystem, but Android malware is also emerging in an endless stream. Many researchers have studied the problem of Android malware detection and have put forward theories and methods from
Externí odkaz:
https://doaj.org/article/9f586d6e390c4ff3b39bcd88d13b79e7
Publikováno v:
Applied Sciences, Vol 13, Iss 3, p 1942 (2023)
Traditional mechanical parts have been increasingly replaced by in-vehicle electronic control units (ECUs) that communicate via control area networks (CAN). For security reasons, the Database CAN (DBC) file, which defines the contents of CAN messages
Externí odkaz:
https://doaj.org/article/2b4c7206650c40ab8aa65d216f375bbf
Publikováno v:
Sensors, Vol 23, Iss 3, p 1204 (2023)
The vehicular ad hoc network (VANET) constitutes a key technology for realizing intelligent transportation services. However, VANET is characterized by diverse message types, complex security attributes of communication nodes, and rapid network topol
Externí odkaz:
https://doaj.org/article/c122f090d4b14f1f96e54af14772fab3
Publikováno v:
IEEE Access, Vol 7, Pp 141850-141867 (2019)
Android app clone detection has been extensively studied in our community, and a number of effective approaches and frameworks were proposed and released. However, there still remains one open challenge that has not been well addressed in previous wo
Externí odkaz:
https://doaj.org/article/59f7f62fb2be42c9ae082080f68e70df