Article
Engineering, Electrical & Electronic
Bohan Li, Xinyang Song, Tianlun Dai, Wenlong Wu, Di Zhu, Xiangping Zhai, Hao Wen, Qinyong Lin, Huazhou Chen, Ken Cai
Summary: Vehicular ad hoc networks (VANETs) are essential for improving traffic efficiency and safety through real-time information sharing. Digital Twins (DT) have been used to facilitate the design and deployment of VANETs, but face interference from malicious vehicles. To address this, a decentralized trust management scheme embedded with blockchain is proposed to detect malicious DT-vehicles.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Houda Amari, Zakaria Abou El Houda, Lyes Khoukhi, Lamia Hadrich Belguith
Summary: Intelligent Transportation System (ITS) is now a crucial part of daily human life. Vehicular Ad hoc Networks (VANETs) have emerged as a promising component of ITS, promising to enhance transport efficiency, passenger safety, and comfort through the exchange of traffic and infotainment information. VANETs have adopted new paradigms such as Cloud, SDN, Fog computing, Blockchain, and AI techniques to provide strategic and secure communications, improving their reliability.
Article
Computer Science, Theory & Methods
Mohammad Sadegh Azhdari, Ali Barati, Hamid Barati
Summary: This paper proposes a fuzzy logic-based routing method with authentication capability in vehicular ad hoc networks. The method achieves superior performance in terms of end-to-end delay, packet collision, packet delivery rate, but slightly increases routing overhead.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Computer Science, Information Systems
Alireza Aghabagherloo, Mahshid Delavar, Javad Mohajeri, Mahmoud Salmasizadeh, Bart Preneel
Summary: Vehicular ad-hoc networks (VANETs) play a crucial role in enhancing traffic safety and efficiency by providing a communication platform for real-time information sharing. This paper proposes a secure and efficient Conditional Privacy-Preserving Authentication (CPPA) scheme to address the security requirements of data authentication and privacy preservation in VANETS, with improved performance compared to existing schemes.
Article
Telecommunications
Abir Mchergui, Tarek Moulahi, Sherali Zeadally
Summary: Advancements in communications, smart transportation systems, and computer systems have opened up new possibilities for intelligent solutions in traffic safety and convenience. Artificial Intelligence (AI) is currently being utilized in the field of Vehicular Ad hoc NETworks (VANETs) to enhance conventional data-driven methods and improve passenger comfort, safety, and road experience.
VEHICULAR COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
L. Ellen Funderburg, Huimin Ren, Im-Yeong Lee
Summary: VANETs are a type of Internet of Things system where vehicles communicate with each other and infrastructure to improve safety and quality of life. Security in VANETs requires vehicles to be accountable for accurate reporting and quick message security. The paper introduces a pairing-free signature scheme for VANETs to prevent identity forgery.
Article
Energy & Fuels
Ghassan Husnain, Shahzad Anwar, Gulbadan Sikander, Armughan Ali, Sangsoon Lim
Summary: This study presents a bio-inspired, cluster-based routing algorithm using the intelligent, probability-based, and nature-inspired whale optimization algorithm (p-WOA) for vehicular communication. The proposed method outperforms existing techniques in terms of the number of cluster heads (CH) and demonstrates superior performance through calculations of Packet Delivery Ratio (PDR), average throughput, and latency. The study confirms that VANETs employing ITS applications can optimize their clusters by a factor of 75, reducing communication costs and extending cluster lifespan.
Article
Telecommunications
Mehmet Aslan, Sevil Sen
Summary: This study proposes a dynamic trust management model for VANETs using genetic programming algorithm and evolutionary dynamic optimization techniques. The model successfully evaluates the trustworthiness of vehicles and messages, prevents the propagation of bogus messages, and detects changes in the network in a timely manner. The proposed model shows robustness to increasing malicious messages and achieves high detection rate and low false positive rate.
VEHICULAR COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Haiyang Yu, Runkun Liu, Zhiheng Li, Yilong Ren, Han Jiang
Summary: This study focuses on balancing efficiency and coverage by establishing an RSU deployment strategy based on traffic demand. Simulation results show that covering 25% of the road segments with RSUs can serve most vehicles and reduce the delay of VANETs. Furthermore, road networks with high traffic demand require more RSUs to achieve the same effect, and early RSU investment is more cost effective.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Civil
Asad Ali, Farhan Aadil, Muhammad Fahad Khan, Muazzam Maqsood, Sangsoon Lim
Summary: Vehicular ad-hoc networks (VANETs) pose challenges for robust and scalable communication. Existing clustering techniques generate excessive clusters, leading to resource consumption and increased communication overhead. To address this, a novel clustering algorithm based on the Harris Hawks Optimization algorithm (HHOCNET) is proposed. Simulations show that HHOCNET outperforms state-of-the-art schemes in optimizing the multi-objective clustering problem in VANETs.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Chemistry, Analytical
Brian Akwirry, Nik Bessis, Hassan Malik, Sarah McHale
Summary: Communicating securely in vehicle ad hoc networks is crucial for operations and safety. This paper proposes a multi-tier trust management system to address the issue of malicious vehicles in the network, effectively identifying them and improving network performance.
Article
Computer Science, Information Systems
Hong Zhong, Lei Chen, Jie Cui, Jing Zhang, Irina Bolodurina, Lu Liu
Summary: This paper proposes a lightweight conditional privacy-preserving authentication (CPPA) scheme based on elliptic curve cryptography, where vehicles generate pseudonyms and public/private key pairs by themselves to avoid key escrow issues. It also utilizes a fog computing model that supports mobility, low latency, and location awareness to improve vehicular communication efficiency and reduce storage overhead efficiently.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Civil
Ida Mirzadeh, Mohammad Sayad Haghighi, Alireza Jolfaei
Summary: This paper proposes a trust-aware cognitive framework to filter malicious messages and detect and isolate malicious entities through a supplementary mechanism. The evaluation demonstrates that the proposed scheme outperforms other methods in terms of accuracy and F1 scores.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Mahmood A. Al-Shareeda, Mohammed Anbar, Iznan Husainy Hasbullah, Selvakumar Manickam
Summary: Vehicular ad hoc networks (VANETs) are increasingly common in smart transportation, but the security and privacy concerns are not fully addressed by existing authentication and privacy schemes.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Theory & Methods
Deepak Choudhary, Roop Pahuja
Summary: This study proposes a solution for improving the performance of Transmission Control Protocols (TCP) in Vehicle Ad hoc Networks (VANETs) by introducing zone-based routing with consideration for mobility. A hybrid optimization algorithm (ABC) is used, which combines Ant Colony Optimization (ACO) and Artificial Bee Colony Optimization (ABCO), with link stability and residual energy as the basis of the fitness function. The effectiveness of the proposed method is evaluated using measures such as delivery ratio, time, and overhead, and compared with other algorithms.
JOURNAL OF BIG DATA
(2023)
Article
Computer Science, Information Systems
Yun Xie, Peng Li, Nadia Nedjah, Brij B. Gupta, David Taniar, Jindan Zhang
Summary: Edge computing provides a solution to the limited storage and computing resources of IoT-based face recognition systems, but data privacy leak remains a problem. This study proposes a general privacy protection framework, utilizing local differential privacy algorithm and identity authentication technology to protect the privacy of face data.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Runhai Jiao, Chengyang Li, Gangyi Xun, Tianle Zhang, Brij B. Gupta, Guangwei Yan
Summary: This paper proposes an end-to-end NILM method for multi-event identification by using convolutional neural networks and multi-head self-attention mechanism. It also introduces a multi-scale anchor detection framework and a novel data augmentation method. Experimental results show that the proposed method achieves a higher average F-1 score of 0.96 compared to other methods.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
(2023)
Article
Computer Science, Information Systems
Shiwen Zhang, Biao Hu, Wei Liang, Kuan-Ching Li, Brij B. Gupta
Summary: This article proposes a caching-based dual K-anonymous (CDKA) location privacy-preserving scheme in edge computing environments. The scheme uses an edge server to protect user location privacy by reducing device load and providing dual anonymity. Through security analysis and performance evaluation, the robustness and relatively low communication cost of the scheme are demonstrated.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Electrical & Electronic
Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh, Amir H. Gandomi, Mohammad Hijji, Brij B. Gupta, Khan Muhammad
Summary: Heritage multimedia is a valuable cultural asset that provides insights into earlier generations and their creative approach, lifestyle, and historical ideologies. It is also an important resource for boosting the local economy, sustainable communities, and tourism and business sectors. With the advancements in technology and 5G networks, protecting heritage media from unauthorized consumers is crucial. This study proposes a robust and blind watermarking-framework for cultural images (RBWCI) that uses the discrete cosine transform domain for ownership verification and copyright protection.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
(2023)
Article
Computer Science, Artificial Intelligence
Kwok Tai Chui, Brij B. Gupta, Rutvij H. Jhaveri, Hao Ran Chi, Varsha Arya, Ammar Almomani, Ali Nauman
Summary: This paper proposes a multiround transfer learning and modified generative adversarial network (MTL-MGAN) algorithm for lung cancer detection. The algorithm maximizes transferability through a multiround transfer learning process and avoids negative transfer through customized loss functions. The proposed algorithm significantly improves accuracy compared to related works.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2023)
Editorial Material
Computer Science, Artificial Intelligence
Lidia Ogiela, Arcangelo Castiglione, Brij B. Gupta, Dharma P. Agrawal
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Qin Zhang, Zhiwei Guo, Yanyan Zhu, Pandi Vijayakumar, Aniello Castiglione, Brij B. Gupta
Summary: This paper proposes a deep learning-based fast fake news detection model for cyber-physical social services. It takes Chinese text as the objective and adopts characters as the basic processing unit. By using a convolution-based neural computing framework, it extracts feature representation for news texts, ensuring both processing speed and detection ability for Chinese short texts. Experimental results show that this model has lower training time cost and higher classification accuracy than baseline methods.
PATTERN RECOGNITION LETTERS
(2023)
Article
Business
Fei Zhou, Xue Li, Chunjia Han, Lan Zhang, Brij B. Gupta
Summary: Based on an empirical analysis of 480 valid questionnaires from the Asia-Pacific region, this study found that entrepreneurial support systems have a positive impact on international corporate entrepreneurship (ICE). It also found that resource slack acts as a mediator between institutional support and ICE, and local and ultra-local network embeddedness moderate the relationship between institutional support and resource slack.
INTERNATIONAL ENTREPRENEURSHIP AND MANAGEMENT JOURNAL
(2023)
Article
Business
Brij B. Gupta, Akshat Gaurav, Prabin Kumar Panigrahi
Summary: Smart and innovative education is essential for the development of sustainable entrepreneurship practices and aims to teach young people to be responsible members of society and play an active role in shaping the future. However, traditional teaching techniques are insufficient, and the integration of cutting-edge technologies such as IoT, cloud computing, AI, and machine learning is required to achieve a better future.
INTERNATIONAL ENTREPRENEURSHIP AND MANAGEMENT JOURNAL
(2023)
Article
Business
Shizhen Bai, Hao He, Chunjia Han, Mu Yang, Dingyao Yu, Xinrui Bi, Brij B. B. Gupta, Weijia Fan, Prabin Kumar Panigrahi
Summary: This study examines the impact of thematic influences on theme park visitors' satisfaction using user-generated data. Through the analysis of 112,000 reviews posted by visitors to Shanghai Disney Resort, the study employs structural topic modeling to reveal the dynamics of user-generated data over time. The findings indicate that visitors' satisfaction is closely related to service quality and their overall playing experience, with different emphasis among early and later tourists. Furthermore, the relationship between customer reviews and ratings by tourists becomes less significant over time, suggesting that reviews are better indicators of subjective feelings or experiences. The study contributes to the literature on tourism, service, and consumer behavior, offering practical implications.
JOURNAL OF CONSUMER BEHAVIOUR
(2023)
Article
Business
Brij B. Gupta, Akshat Gaurav, Prabin Kumar Panigrahi
Summary: The implementation of a system that facilitates safe and efficient data transmission in the healthcare industry could greatly benefit various aspects of healthcare. However, there are challenges in handling the large quantity of data generated by smart devices in B2B-based healthcare systems.
JOURNAL OF BUSINESS RESEARCH
(2023)
Article
Communication
David Juarez-Varon, Isabel Bellido-Garcia, Brij-B. Gupta
Summary: The aim of this study is to use neurotechnology to study the effects of onsite and online university education on the learning process. This is an innovative approach in this field. The results show that students who attended classes in person had higher levels of emotional intensity and positive brain activity (attention, interest, and engagement) compared to online students. Online students also showed less interest, attention, and emotional intensity, indicating that distance learning is less effective than classroom learning for a university master's degree class in terms of brain signals.
Article
Computer Science, Information Systems
Xiang Yu, Chonghua Wang, Xiaojing Zheng, Chaoyu Zeng, Brij B. Gupta
Summary: This paper constructs a non-cooperative/cooperative stochastic differential game model to prove that the optimal strategies trajectory of agents in a system with a topological configuration of a Multi-Local-World graph would converge into a certain attractor if the system's configuration is fixed. It is concluded that the optimal strategy trajectory with a nonlinear operator of cooperative/non-cooperative stochastic differential game between agents can make agents in a certain Local-World coordinate and make the Local-World payment maximize, and can make the all Local-Worlds equilibrated; furthermore, the optimal strategy of the coupled game can converge into a particular attractor that decides the optimal property.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Computer Science, Information Systems
Ammar Almomani, Mohammed Alweshah, Waleed Alomoush, Mohammad Alauthman, Aseel Jabai, Anwar Abbass, Ghufran Hamad, Meral Abdalla, Brij B. Gupta
Summary: Voice classification is essential for creating intelligent systems that assist with student exams, criminal identification, and security systems. The research aims to develop a system that can predict and classify gender, age, and accent, resulting in the proposal of a new system called Classifying Voice Gender, Age, and Accent (CVGAA). By incorporating rhythm-based features and using backpropagation and bagging algorithms, the voice recognition system's accuracy is significantly improved, with the Bagging algorithm achieving the highest accuracy of 55.39% in the voice common dataset and 78.94% in speech accent for age classification and accent accuracy.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Engineering, Civil
Brij Bhooshan Gupta, Akshat Gaurav, Ching-Hsien Hsu, Bo Jiao
Summary: The maritime transportation system is responsible for providing safe transportation in the vast area covered by water. IoT devices are used for continuous monitoring of vessel performance and secure data sharing to protect confidential information. Identity-based encryption is used for authentication management in this scheme.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)