4.3 Editorial Material

Intelligent collaborative system and service in value network for enterprise computing

Journal

ENTERPRISE INFORMATION SYSTEMS
Volume 12, Issue 1, Pages 1-3

Publisher

TAYLOR & FRANCIS LTD
DOI: 10.1080/17517575.2016.1238962

Keywords

-

Ask authors/readers for more resources

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Civil

Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey

Mahdi Dibaei, Xi Zheng, Youhua Xia, Xiwei Xu, Alireza Jolfaei, Ali Kashif Bashir, Usman Tariq, Dongjin Yu, Athanasios V. Vasilakos

Summary: This paper discusses the latest communication technologies and applications in vehicular networks, explores the use of machine learning and blockchain in cybersecurity, and provides insights for future research to secure vehicular networks.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

BrainIoT: Brain-Like Productive Services Provisioning With Federated Learning in Industrial IoT

Hui Yang, Jiaqi Yuan, Chao Li, Guanliang Zhao, Zhengjie Sun, Qiuyan Yao, Bowen Bao, Athanasios V. Vasilakos, Jie Zhang

Summary: This article proposes a brain-like productive service provisioning scheme with federated learning (BrainIoT) for the Industrial Internet of Things (IIoT), which enhances the accuracy and quality of service prediction through mining industrial knowledge graph-based relations and globally optimized resource reservation.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Revocable Identity-Based Access Control for Big Data with Verifiable outsourced Computing

Hu Xiong, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos

Summary: The paper presents an identity-based signcryption scheme with efficient revocation and the ability to outsource unsigncryption, enabling secure big data communications. The scheme achieves end-to-end confidentiality, authentication, non-repudiation, and integrity, while providing scalable revocation functionality.

IEEE TRANSACTIONS ON BIG DATA (2022)

Editorial Material Automation & Control Systems

Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System

Ximeng Liu, Robert H. Deng, Yinbin Miao, Athanasios V. Vasilakos

Summary: 5G technology enables the interconnection of humans, machines, and things, allowing devices with communication and sensing capabilities to securely and reliably connect to the Internet. It has potential applications in various military and civilian settings, including radar anomaly detection, unmanned aerial vehicles (UAV) data storage sharing, and traffic data analysis.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Biochemical Research Methods

Quantum Speedup for Inferring the Value of Each Bit of a Solution State in Unsorted Databases Using a Bio-Molecular Algorithm on IBM Quantum's Computers

Weng-Long Chang, Wen-Yu Chung, Chun-Yuan Hsiao, Renata Wong, Ju-Chin Chen, Mang Feng, Athanasios V. Vasilakos

Summary: In this paper, a bio-molecular algorithm is proposed for inferring the value of a bit from an unsorted database. The algorithm determines the value of each bit by executing the algorithm multiple times and utilizes quantum algorithms to compute the unitary operator and eigenvalues for specific bits. The effectiveness of the algorithm is verified through experiments.

IEEE TRANSACTIONS ON NANOBIOSCIENCE (2022)

Article Automation & Control Systems

RNN-K: A Reinforced Newton Method for Consensus-Based Distributed Optimization and Control Over Multiagent Systems

Mou Wu, Naixue Xiong, Athanasios V. Vasilakos, Victor C. M. Leung, C. L. Philip Chen

Summary: The authors propose a reinforced network Newton method with K-order control flexibility (RNN-K) to solve distributed optimization problems. The method integrates consensus strategy and the latest knowledge into local descent direction and accelerates Newton direction's descent by making use of intermediate results. The authors address the difficulty of designing approximated Newton descent in distributed settings by using a special Taylor expansion. The simulation results demonstrate the effectiveness of the method in three types of distributed optimization problems.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Automation & Control Systems

Distributed Population Dynamics for Searching Generalized Nash Equilibria of Population Games With Graphical Strategy Interactions

Shaolin Tan, Yaonan Wang, Athanasios V. Vasilakos

Summary: This article explores the modeling of population games and dynamics with static and dynamic graphical communication structures. It introduces the concept of generalized Nash equilibria for population games with graphical strategy interactions and establishes the equivalence between the set of generalized Nash equilibria and the set of rest points of its distributed population dynamics. The study also analyzes the conditions for convergence to generalized Nash equilibrium and Nash equilibrium for distributed population dynamics with both static and dynamical graphical structures.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2022)

Article Computer Science, Information Systems

Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things

Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Yinbin Miao, Athanasios V. Vasilakos

Summary: Attribute-based encryption and attribute-based keyword search provide fine-grained access and search control for cloud-assisted Industrial Internet of Things. However, existing schemes suffer from high computational overhead, wrong search results, untrustworthy cloud servers, and cumbersome verification processes. This paper presents a verifiable online/offline multi-keyword search scheme that addresses these issues and demonstrates its applicability in the healthcare domain.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Computer Science, Information Systems

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

Hao Li, Jinwei Wang, Neal Xiong, Yi Zhang, Athanasios V. Vasilakos, Xiangyang Luo

Summary: With the rapid rise of urbanization, criminals are able to exploit social networks to spread secret information by using images as a cover. Determining whether these images contain secret information poses a significant challenge to multimedia computing security. Steganalysis methods based on deep learning can effectively identify the presence of secret information in images transmitted on the Internet in urban scenes, thus playing a crucial role in safeguarding national and social security.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources

Kuan Wang, Jun Wu, Xi Zheng, Jianhua Li, Wu Yang, Athanasios V. Vasilakos

Summary: Cloud and edge computing can be used to establish an energy-centric smart grid to address the challenges of distributed energy resources and unstable energy supply.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Remote Sensing

Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Jaskaran Singh, Athanasios V. Vasilakos

Summary: The combination of drones and the Internet has led to the emergence of the Internet of Drones (IoD). This paper proposes a secure blockchain-enabled authentication key management framework for drones in networks beyond 5G. The system's security is demonstrated through detailed analysis and formal verification, showing its resistance against various attacks.

DRONES (2023)

Article Computer Science, Theory & Methods

Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis

Yiqin Qiu, Hui Tian, Haizhou Li, Chin-Chen Chang, Athanasios V. Vasilakos

Summary: This paper proposes a novel steganalysis method based on separable convolution network (SepSteNet) with dual-stream pyramid enhanced strategy (DPES) to improve the detection performance of speech steganography. Experimental results show that the presented method significantly outperforms the existing ones, and DPES can effectively enhance the performance of the existing deep neural network for speech steganalysis.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Enabling Precision Medicine via Contemporary and Future Communication Technologies: A Survey

Uche K. K. Chude-Okonkwo, Babu S. S. Paul, Athanasios V. V. Vasilakos

Summary: Precision medicine is an innovative medical approach that takes into account individuals' omics, medical histories, lifestyles, and environmental information for disease treatment. To fully realize the benefits of precision medicine, various contemporary and future technologies such as nanotechnology, sensor networks, big data, and artificial intelligence need to be utilized. These technologies and applications require a communication network to work together effectively. Thus, communication technology plays a crucial role in the success of precision medicine.

IEEE ACCESS (2023)

Article Automation & Control Systems

Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds

Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, Athanasios V. Vasilakos

Summary: This paper proposes a novel resource allocation framework (ETP-WE) based on VM threat prediction and dynamic workload estimation, which can predict VM threats and resource usage in real-time. By conducting multiple risk analyses for each VM, efficient VM placement, and developing an ensemble predictor for resource utilization, the framework achieves secure and resource-efficient VM allocation.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health

Mohammad Ali, Mohammad-Reza Sadeghi, Ximeng Liu, Athanasios V. Vasilakos

Summary: The rapid development of cloud computing and IoT has the potential to significantly improve healthcare quality through smart health (s-health). However, existing s-health solutions have not adequately addressed concerns regarding data integrity, user anonymity, and authentication. To address these issues, a new aggregate anonymous attribute-based remote data verification scheme called A(3)B-RDV is introduced. It provides efficient and secure verification of the integrity of multiple cloud data files, while also ensuring complete anonymity and supporting dishonest-user traceability.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

No Data Available