Skip to main content

Machine Learning for Trust, Security and Privacy in Computing and Communications

  1. Fog computing, as a new distributed computing framework, extends the tasks originally done in the cloud data center to the edge of the network and brings more serious security challenges while providing conven...

    Authors: Xiang Lv, Dezhi Han, Dun Li, Lijun Xiao and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:105
  2. Data stream is a type of data that continue to grow over time. For example, network security data stream will constantly be generated in the field of data security, and encrypted data stream will be generated ...

    Authors: Hui Liu, Aihua Wu, Mingkang Wei and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:102
  3. This paper is concerned with asynchronous dissipative control for a class of networked time-delay Markov jump systems with event-triggered scheme and packet dropouts. To reduce communication consumption, an ev...

    Authors: Huiying Chen, Renwei Liu, Ping He and Zuxin Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:82
  4. Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing. Malicious circuits, also known as hardware Trojans,...

    Authors: Der-Chen Huang, Chun-Fang Hsiao, Tin-Wei Chang and Ying-Yi Chu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:81
  5. Psychological fatigue includes mental fatigue and burnout. In order to investigate the impact of psychological fatigue on athletes' response monitoring, event-related potentials technique is typically used, an...

    Authors: Jin Li, Yanni Wang and Sihua Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:76
  6. Person search is of great significance to public safety research, such as crime surveillance, video surveillance and security. Person search is a method of locating and identifying the queried person from a co...

    Authors: Yuqi Chen, Dezhi Han, Mingming Cui, Zhongdai Wu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:75
  7. Spread spectrum communication is a common communication method in underwater communication. Based on the space-time processor received by the array, it can filter the signals arriving along each path separatel...

    Authors: Feng Zhou, Wenbo Zhang, Baosheng Zhang, Xiaofeng Ji and Xuanze Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:60
  8. Blockchain is a distributed database method of storing electronic information in digital form that makes it challenging to transform, hack, or rogue the system. Each time a new operation transpires on the Bloc...

    Authors: Usman Tariq
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:47
  9. Dangerous driving, e.g., using mobile phone while driving, can result in serious traffic problem and threaten to safety. To efficiently alleviate such problem, in this paper, we design an intelligent monitorin...

    Authors: J. H. Jixu Hou, Xiaofeng Xie, Qian Cai, Zhengjie Deng, Houqun Yang, Hongnian Huang, Xun Wang, Lei Feng and Yizhen Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:42
  10. Medical data involves a large amount of personal information and is highly privacy sensitive. In the age of big data, the increasing informatization of healthcare makes it vital that medical information is sto...

    Authors: Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang and Zhongdai Wu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:40
  11. Network intrusion detection, which takes the extraction and analysis of network traffic features as the main method, plays a vital role in network security protection. The current network traffic feature extra...

    Authors: Ming Li, Dezhi Han, Dun Li, Han Liu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:39
  12. Unsupervised federated domain adaptation uses the knowledge from several distributed unlabelled source domains to complete the learning on the unlabelled target domain. Some of the existing methods have limite...

    Authors: Bin Wang, Gang Li, Chao Wu, WeiShan Zhang, Jiehan Zhou and Ye Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:37
  13. Low earth orbit (LEO) satellite communication networks require huge load capacity and information processing speed to carry global communication traffic. Inter-satellite links and the on-board processing are t...

    Authors: Fei Zheng, Chao Wang, Zou Zhou, Zhao Pi and Dongyan Huang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:36
  14. The financial industry is a key to promoting the development of the national economy, and the risk it takes is also the largest hidden risk in the financial market. Therefore, the risk existing in the current ...

    Authors: Tao Liu and Zhongyang Yu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:31
  15. The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy ...

    Authors: Wujian Ye, Qingyuan Zeng, Yihang Peng, Yijun Liu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:30
  16. In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hi...

    Authors: Yung-Hui Li, Ching-Chun Chang, Guo-Dong Su, Kai-Lin Yang, Muhammad Saqlain Aslam and Yanjun Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:28
  17. Motivated by the practical supply chain management of the automobile industry, we study the car sequencing problem (CSP) that minimizes the conflicts occur when sequentially manufacturing cars on an assembly l...

    Authors: Yingjie Yu, Xiaochun Lu, Tao Zhao, Minjiao Cheng, Lin Liu and Wenchao Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:26

    The Correction to this article has been published in EURASIP Journal on Wireless Communications and Networking 2022 2022:112

  18. In the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information n...

    Authors: Tianfu Li, Jingbing Li, Jing Liu, Mengxing Huang, Yen-Wei Chen and Uzair Aslam Bhatti
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:24
  19. Data-driven based deep learing has become a key research direction in the field of artificial intelligence. Abundant training data is a guarantee for building efficient and accurate models. However, due to the...

    Authors: Ning Wei, Longzhi Wang, Guanhua Chen, Yirong Wu, Shunfa Sun and Peng Chen
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:22
  20. In the context of big data, the exploration of the application effect of machine learning in intelligent encryption for real-time image text digital information aims to improve the privacy information security...

    Authors: Liang Liu, Melody Gao, Yong Zhang and Yuxiang Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:21
  21. A multiple clustering algorithm based on high-dimensional automatic identification system (AIS) data is proposed to extract the important waypoints in the ship’s navigation trajectory based on selected AIS att...

    Authors: Feiyang Ren, Yi Han, Shaohan Wang and He Jiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:18