Your selections:
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Mehedi Hassan, Mohammad, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven, Fortino, Giancarlo
Formal verification of fraud-resilience in a crowdsourcing consensus protocol
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad
MIRROR : Mining implicit relationships via structure-enhanced graph convolutional networks
- Liu, Jiaying, Xia, Feng, Ren, Jing, Xu, Bo, Pang, Guanson, Chi, Lianhua
TAP : Traffic Accident Profiling via multi-task spatio-temporal graph representation learning
- Liu, Zhi, Chen, Yang, Xia, Feng, Bian, Jixin, Zhu, Bing, Shen, Guojiang, Kong, Xiangjie
- Ali, Sajid, Abusabha, Omar, Ali, Farman, Imran, Muhammad, Abuhmed, Tamer
A framework for data privacy and security accountability in data breach communications
- Thomas, Louise, Gondal, Iqbal, Oseni, Taiwo, Firmin, Sally
RBFK cipher : a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment
- Rana, Sohel, Mondal, Mondal, Kamruzzaman, Joarder
Methods and applications of clusterwise linear regression : a survey and comparison
- Long, Qiang, Bagirov, Adil, Taheri, Sona, Sultanova, Nargiz, Wu, Xue
Are you sure you would like to clear your session, including search history and login status?