Skip to main content

Machine Learning for Trust, Security and Privacy in Computing and Communications

  1. Dangerous driving, e.g., using mobile phone while driving, can result in serious traffic problem and threaten to safety. To efficiently alleviate such problem, in this paper, we design an intelligent monitorin...

    Authors: J. H. Jixu Hou, Xiaofeng Xie, Qian Cai, Zhengjie Deng, Houqun Yang, Hongnian Huang, Xun Wang, Lei Feng and Yizhen Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:42
  2. Medical data involves a large amount of personal information and is highly privacy sensitive. In the age of big data, the increasing informatization of healthcare makes it vital that medical information is sto...

    Authors: Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang and Zhongdai Wu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:40
  3. Network intrusion detection, which takes the extraction and analysis of network traffic features as the main method, plays a vital role in network security protection. The current network traffic feature extra...

    Authors: Ming Li, Dezhi Han, Dun Li, Han Liu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:39
  4. Unsupervised federated domain adaptation uses the knowledge from several distributed unlabelled source domains to complete the learning on the unlabelled target domain. Some of the existing methods have limite...

    Authors: Bin Wang, Gang Li, Chao Wu, WeiShan Zhang, Jiehan Zhou and Ye Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:37
  5. Low earth orbit (LEO) satellite communication networks require huge load capacity and information processing speed to carry global communication traffic. Inter-satellite links and the on-board processing are t...

    Authors: Fei Zheng, Chao Wang, Zou Zhou, Zhao Pi and Dongyan Huang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:36
  6. The financial industry is a key to promoting the development of the national economy, and the risk it takes is also the largest hidden risk in the financial market. Therefore, the risk existing in the current ...

    Authors: Tao Liu and Zhongyang Yu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:31
  7. The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy ...

    Authors: Wujian Ye, Qingyuan Zeng, Yihang Peng, Yijun Liu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:30
  8. In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hi...

    Authors: Yung-Hui Li, Ching-Chun Chang, Guo-Dong Su, Kai-Lin Yang, Muhammad Saqlain Aslam and Yanjun Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:28
  9. Motivated by the practical supply chain management of the automobile industry, we study the car sequencing problem (CSP) that minimizes the conflicts occur when sequentially manufacturing cars on an assembly l...

    Authors: Yingjie Yu, Xiaochun Lu, Tao Zhao, Minjiao Cheng, Lin Liu and Wenchao Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:26
  10. In the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information n...

    Authors: Tianfu Li, Jingbing Li, Jing Liu, Mengxing Huang, Yen-Wei Chen and Uzair Aslam Bhatti
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:24
  11. Data-driven based deep learing has become a key research direction in the field of artificial intelligence. Abundant training data is a guarantee for building efficient and accurate models. However, due to the...

    Authors: Ning Wei, Longzhi Wang, Guanhua Chen, Yirong Wu, Shunfa Sun and Peng Chen
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:22
  12. In the context of big data, the exploration of the application effect of machine learning in intelligent encryption for real-time image text digital information aims to improve the privacy information security...

    Authors: Liang Liu, Melody Gao, Yong Zhang and Yuxiang Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:21
  13. A multiple clustering algorithm based on high-dimensional automatic identification system (AIS) data is proposed to extract the important waypoints in the ship’s navigation trajectory based on selected AIS att...

    Authors: Feiyang Ren, Yi Han, Shaohan Wang and He Jiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:18