{"id":101,"date":"2022-04-02T09:51:41","date_gmt":"2022-04-02T09:51:41","guid":{"rendered":"http:\/\/aicybersecuritycenter.com\/?page_id=101"},"modified":"2022-12-12T13:49:16","modified_gmt":"2022-12-12T13:49:16","slug":"transactions","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/transactions\/","title":{"rendered":"Journals\/Transactions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"101\" class=\"elementor elementor-101\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e3a8d27 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e3a8d27\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34a07825\" data-id=\"34a07825\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c4fc5 elementor-widget elementor-widget-heading\" data-id=\"4c4fc5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Journals \/ Transactions (\u671f\u520a\/\u4ea4\u6613)<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69944e7e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69944e7e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-65cae764\" data-id=\"65cae764\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-26beb577\" data-id=\"26beb577\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bcfa6dc elementor-widget elementor-widget-text-editor\" data-id=\"bcfa6dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<ul><li>Jiahui Li, Hao Wu, Jiapei Chen, Qiang He and Ching-Hsien Hsu, &#8220;Topology-Aware Neural Model for Highly Accurate QoS Prediction&#8221; IEEE Transactions on Parallel and Distributed Systems, Vol. 33, No. 7, pp. 1538-1552, July 2022. DOI 10.1109\/TPDS.2021.3116865<\/li><li>Riyahi, M., Rafsanjani, M. K., Gupta, B. B., &amp; Alhalabi, W. (2022). Multiobjective whale optimization algorithm\u2010based feature selection for intelligent systems. International Journal of Intelligent Systems, 37(11), 9037-9054.<\/li><li>Xing Chen, Ming Li, Hao Zhong, Yun Ma and Ching-Hsien Hsu, &#8220;DNNOff: Offloading DNN-based Intelligent IoT Applications in Mobile Edge Computing&#8221; IEEE Transactions on Industrial Informatics, Vol. 18, No. 4, pp. 2820-2829, DOI 10.1109\/TII.2021.3075464, April 2022<\/li><li>Wang, Y., Vijayakumar, P., Gupta, B. B., Alhalabi, W., &amp; Sivaraman, A. (2022). An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model. Pattern Recognition Letters, 163, 145-151.<\/li><li>Yingyuan Xiao and Ching-Hsien Hsu, &#8220;Finding the Next Interesting Loan for Investors on a Peer-to-Peer Lending Platform&#8221; IEEE Access, Vol. 9, pp. 111293-111304, Aug. 2021, 10.1109\/ACCESS.2021.3103510<\/li><li>Yang, H., Vijayakumar, P., Shen, J., &amp; Gupta, B. B. (2022). A location-based privacy-preserving oblivious sharing scheme for indoor navigation. Future Generation Computer Systems, 137, 42-52.<\/li><li>Huang, Tiansheng; lin, weiwei; Hong, Xiaobin; Wang, Xiumin; Wu, Qingbo; Li, Rui; Hsu, Ching-Hsien; Zomaya, Albert, &#8220;Adaptive Processor Frequency Adjustment for Mobile-Edge Computing with Intermittent Energy Supply&#8221; IEEE Internet of Things, Vol. 9, Issue 10, pp. 7446-7462, 10.1109\/JIOT.2021.3119866, May 2022.<\/li><li>Hojjat Baghban, Amir Rezapour, Ching-Hsien Hsu*, Sirapop Nuannimnoi and Ching-Yao Huang &#8220;Edge-AI: IoT Request Service Provisioning in Federated Edge Computing Using Actor-critic Reinforcement Learning&#8221; IEEE Transactions on Engineering Management, Accepted and In Press, May 2022. 10.1109\/TEM.2022.3166769<\/li><li>Hao Wu\u3001Zhengxin Zhang\u3001Jiacheng Luo\u3001Kun Yue\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu)*, Multiple Attributes QoS Prediction via Deep Neural Model with Contexts, IEEE Transactions on Services Computing, vol.8 no.2021 pp.1-10<\/li><li>Gunasekaran Manogaran(Gunasekaran Manogaran)*\u3001Vijayalakshmi Saravanan\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu), Information-Centric Content Management Framework for Software Defined Internet of Vehicles Towards Application Specific Services, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, vol.22 no.7 pp.4541-4549<\/li><li>Gupta, B. B., Gaurav, A., Hsu, C. H., &amp; Jiao, B. (2021). Identity-Based Authentication Mechanism for Secure Information Sharing in the Maritime Transport System. <em>IEEE Transactions on Intelligent Transportation Systems.<\/em><\/li><li>Prathiba, S. B., Raja, G., Bashir, A. K., Alzubi, A. A., &amp; Gupta, B. (2021). SDN-assisted Safety Message Dissemination Framework for Vehicular Critical Energy Infrastructure. <em>IEEE Transactions on Industrial Informatics<\/em>.<\/li><li>Ahvanooey, M. T., Zhu, M. X., Li, Q., Mazurczyk, W., Choo, K. K. R., Gupta, B. B., &amp; Conti, M. (2021). Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.\u00a0<em>IEEE Internet of Things Journal<\/em>.<\/li><li>Lu, J., Shen, J., Vijayakumar, P., &amp; Gupta, B. B. (2021). Blockchain-based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things. <em>IEEE Transactions on Industrial Informatics<\/em>.<\/li><li>Zhou, Z., Gaurav, A., Gupta, B. B., Lytras, M. D., &amp; Razzak, I. (2021). A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System.\u00a0<em>IEEE Transactions on Intelligent Transportation Systems<\/em>.<\/li><li>Zhou, Z., Su, Y., Zhang, Y., Xia, Z., Du, S., Gupta, B. B., &amp; Qi, L. (2021). Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment. <em>IEEE Internet of Things Journal.<\/em><\/li><li>Cviti\u0107, I., Perakovi\u0107, D., Gupta, B., &amp; Choo, K. K. R. (2021). Boosting-based DDoS Detection in Internet of Things Systems.\u00a0<em>IEEE Internet of Things Journal<\/em>.<\/li><li>Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., &amp; Almomani, E. (2013). A survey of phishing email filtering techniques. <em>IEEE communications surveys &amp; tutorials<\/em>, 15(4), 2070-2090.<\/li><li>Gupta, B. B., Li, K. C., Leung, V. C., Psannis, K. E., &amp; Yamaguchi, S. (2021). Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System.\u00a0<em>IEEE\/CAA Journal of Automatica Sinica<\/em>.<\/li><li>Minrui Xu, Jialiang Peng, B. B Gupta, Jiawen Kang, Zehui Xiong, Zhenni Li, Ahmed A. Abd El-Latif, &#8220;Multi-Agent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber-Physical Systems,&#8221;\u00a0 <em>IEEE Internet of Things Journal<\/em>, 2021<\/li><li>Manjit Kaur, Dilbag Singh, Vijay Kumar, B. B. Gupta, Ahmed A. Abd El-Latif, &#8220;Secure and Energy efficient based E-health Care Framework for Green Internet of Things, <em>IEEE Transactions on Green Communications and Networking<\/em>, 2021<\/li><li>Junwei Zhang, Zhuzhu Wang, Dandan Wang, Xinglong Zhang, Brij Gupta, Ximeng Liu, Jianfeng Ma, &#8220;A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box,&#8221; <em>IEEE Transactions on Industrial Informatics<\/em>, 2021<\/li><li>Gupta, B. B., &amp; Lytras, M. D. (2022). Fog-Enabled Secure and Efficient Fine-Grained Searchable Data Sharing and Management Scheme for IoT-Based Healthcare Systems.\u00a0<em>IEEE Transactions on Engineering Management<\/em>.<\/li><li>Fatemidokht, H., Rafsanjani, M. K., Gupta, B. B., &amp; Hsu, C. H. (2021). Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems.\u00a0<em>IEEE Transactions on Intelligent Transportation Systems<\/em>.<\/li><li>Zhou, Z., Gupta, B. B., Gaurav, A., Li, Y., Lytras, M. D., &amp; Nedjah, N. (2022). An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System.\u00a0<em>IEEE Transactions on Intelligent Transportation Systems<\/em>.<\/li><li>Masud, M., Gaba, G. S., Alqahtani, S., Muhammad, G., Gupta, B. B., Kumar, P., &amp; Ghoneim, A. (2020). A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.\u00a0<em>IEEE Internet of Things Journal<\/em>.<\/li><li>Wang, C., Shen, J., Vijayakumar, P., &amp; Gupta, B. B. (2021). Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.\u00a0<em>IEEE Transactions on Intelligent Transportation Systems<\/em>.<\/li><li>Stergiou, C. L., Psannis, K. E., &amp; Gupta, B. B. (2020). IoT-based Big Data secure management in the Fog over a 6G Wireless Network.\u00a0<em>IEEE Internet of Things Journal<\/em>.<\/li><li>Xu, S., Wang, Z., Fan, L., Cai, X., Ji, H., Khoo, S. C., &amp; Gupta, B. B. (2021). DeepSuite: A Test Suite Optimizer for Autonomous Vehicles.\u00a0<em>IEEE Transactions on Intelligent Transportation Systems<\/em>.<\/li><li>Huang, Y., Li, B., Liu, Z., Li, J., Yiu, S. M., Baker, T., &amp; Gupta, B. B. (2019). ThinORAM: towards practical oblivious data access in fog computing environment. <em>IEEE Transactions on Services Computing<\/em>, 13(4), 602-612.<\/li><li>Zhang, Z., Li, C., Gupta, B. B., &amp; Niu, D. (2018). Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes. <em>IEEE Access<\/em>, 6, 38273-38284.<\/li><li>Xu, Z., He, D., Vijayakumar, P., Gupta, B., &amp; Shen, J. (2021). Certificateless Public Auditing Scheme with Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.\u00a0<em>IEEE Journal of Biomedical and Health Informatics<\/em>.<\/li><li>Agrawal, D. P., Gupta, B. B., Wang, H., Chang, X., Yamaguchi, S., &amp; Perez, G. M. (2018). <br \/>Deep learning models for industry informatics. <em>IEEE Transactions on Industrial Informatics,<\/em> 14(7), 3166-3169.<\/li><li>Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., &amp; Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. <em>IEEE Internet of Things Journal,<\/em> 6(2), 1402-1409.<\/li><li>Yu, Z., Gao, C. Z., Jing, Z., Gupta, B. B., &amp; Cai, Q. (2018). A practical public key encryption scheme based on learning parity with noise. <em>IEEE Access<\/em>, 6, 31918-31923.<\/li><li>Ghoneim, A., Muhammad, G., Amin, S. U., &amp; Gupta, B. (2018). Medical image forgery detection for smart healthcare. <em>IEEE Communications Magazine<\/em>, 56(4), 33-37.<\/li><li>Abd El-Latif, A. A., Abd-El-Atty, B., Hossain, M. S., Rahman, M. A., Alamri, A., &amp; Gupta, B. B. (2018). Efficient quantum information hiding for remote medical image sharing. <em>IEEE Access<\/em>, 6, 21075-21083.<\/li><li>Psannis, K. E., Stergiou, C., &amp; Gupta, B. B. (2018). Advanced media-based smart big data on intelligent cloud systems. <em>IEEE Transactions on Sustainable Computing<\/em>, 4(1), 77-87.<\/li><li>Wang, Y. G., Xie, D., &amp; Gupta, B. B. (2018). A study on the collusion security of LUT-based client-side watermark embedding. <em>IEEE Access<\/em>, 6, 15816-15822.<\/li><li>Din, S., Paul, A., Ahmad, A., Gupta, B. B., &amp; Rho, S. (2018). Service orchestration of optimizing continuous features in industrial surveillance using big data based fog-enabled internet of things. <em>IEEE Access<\/em>, 6, 21582-21591.<\/li><li>Dutta, U. K., Razzaque, M. A., Al-Wadud, M. A., Islam, M. S., Hossain, M. S., &amp; Gupta, B. B. (2018). Self-adaptive scheduling of base transceiver stations in green 5g networks. <em>IEEE Access<\/em>, 6, 7958-7969.<\/li><li>Jiang, F., Fu, Y., Gupta, B. B., Liang, Y., Rho, S., Lou, F., &#8230; &amp; Tian, Z. (2018). Deep learning based multi-channel intelligent attack detection for data security. <em>IEEE transactions on Sustainable Computing<\/em>, 5(2), 204-212.<\/li><li>Alhaidary, M., Rahman, S. M. M., Zakariah, M., Hossain, M. S., Alamri, A., Haque, M. S. M., &amp; Gupta, B. B. (2018). Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol. <em>IEEE Access<\/em>, 6, 6071-6081.<\/li><li>Elmisery, A. M., Sertovic, M., &amp; Gupta, B. B. (2017). Cognitive privacy middleware for deep learning mashup in environmental IoT. <em>IEEE access<\/em>, 6, 8029-8041.<\/li><li>Zheng, Q., Wang, X., Khan, M. K., Zhang, W., Gupta, B. B., &amp; Guo, W. (2017). A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. <em>IEEE Access<\/em>, 6, 711-722.<\/li><li>Stergiou, C. L., Psannis, K. E., &amp; Gupta, B. B. (2021). InFeMo: flexible big data management through a federated cloud system.\u00a0<em>ACM Transactions on Internet Technology (TOIT)<\/em>,\u00a0<em>22<\/em>(2), 1-22.<\/li><li>P Ren, Y Xiao, X Chang, PY Huang, Z Li, BB Gupta, X Chen, X Wang, A Survey of Deep Active Learning<em>. ACM Computing Surveys (CSUR) <\/em>54 (9), 1-40<\/li><li>Liang, Y. Liu, Brij B. Gupta, \u201cPPRP: Preserving-Privacy Route Planning Scheme in VANETs\u201d, <em>ACM Transactions on Internet Technology (TOIT),<\/em> 2020.<\/li><li>Zhou, Zhili; Wang, Meimin; Ni, Zewen; Xia, Zhihua; Gupta, Brij B. Reliable and Sustainable Product Evaluation Management System Based on Blockchain. <em>IEEE Transactions on Engineering Management<\/em>, 2021.<\/li><li>Choi, C., Wang, T., Esposito, C., Gupta, B. B., &amp; Lee, K. (2021). Sensored Semantic Annotation for Traffic Control Based on Knowledge Inference in Video.\u00a0<em>IEEE Sensors Journal<\/em>,\u00a0<em>21<\/em>(10), 11758-11768.<\/li><li>Muhammad, G., Alhamid, M. F., Alsulaiman, M., &amp; Gupta, B. (2018). Edge computing with cloud for voice disorder assessment and treatment. <em>IEEE Communications Magazine<\/em>, 56(4), 60-65.<\/li><li>Cao, N., Liu, P., Li, G., Zhang, C., Cao, S., Cao, G., &#8230; &amp; Gupta, B. B. (2018). Evaluation models for the nearest closer routing protocol in wireless sensor networks. <em>IEEE Access<\/em>, 6, 77043-77054.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1578672d\" data-id=\"1578672d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Journals \/ Transactions (\u671f\u520a\/\u4ea4\u6613) Jiahui Li, Hao Wu, Jiapei Chen, Qiang He and Ching-Hsien Hsu, &#8220;Topology-Aware Neural Model for Highly Accurate QoS Prediction&#8221; IEEE Transactions on Parallel and Distributed Systems, Vol. 33, No. 7, pp. 1538-1552, July 2022. DOI 10.1109\/TPDS.2021.3116865 Riyahi, M., Rafsanjani, M. K., Gupta, B. B., &amp; Alhalabi, W. (2022). Multiobjective whale optimization<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/transactions\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Journals\/Transactions&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/101"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":26,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/101\/revisions"}],"predecessor-version":[{"id":1726,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/101\/revisions\/1726"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}