Home > Research > Security Lancaster (Distributed Systems) > Publications & Outputs
View graph of relations

Security Lancaster (Distributed Systems)

  1. 2024
  2. E-pub ahead of print

    SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on Blockchain

    Xiong, S., Chen, P., Ge, S. & Ni, Q., 7/10/2024, (E-pub ahead of print) In: IEEE Transactions on Information Forensics and Security.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    AoI-minimal Power Adjustment in RF-EH-powered Industrial IoT Networks: A Soft Actor-Critic-Based Method

    Ge, Y., Xiong, K., Wang, Q., Ni, Q., Fan, P. & Letaief, K. B., 1/09/2024, In: IEEE Transactions on Mobile Computing. 23, 9, p. 8729 - 8741 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. E-pub ahead of print

    Multilayer Evolving Fuzzy Neural Networks with Self-Adaptive Dimensionality Compression for High-Dimensional Data Classification

    Gu, X., Ni, Q. & Shen, Q., 21/08/2024, (E-pub ahead of print) In: IEEE Transactions on Fuzzy Systems. 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Transactive Energy System Deployment over Insecure Communication Links

    Lu, Y., Lian, J., Zhu, M. & Ma, K., 31/07/2024, In: IEEE Transactions on Automation Science and Engineering. 21, 3, p. 2677-2688 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. E-pub ahead of print

    Task Dependency Aware Optimal Resource Allocation for URLLC Edge Network: A Digital Twin Approach Using Finite Blocklength

    Awais, M., Pervaiz, H., Ni, Q. & Yu, W., 12/07/2024, (E-pub ahead of print) In: IEEE Transactions on Green Communications and Networking. p. 2473-2400 14 p., 10596126.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    An empirical study of reflection attacks using NetFlow data

    Chuah, E. & Suri, N., 1/07/2024, In: Cybersecurity. 7, 1, 13.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Risk-Based Safety Scoping of Adversary-Centric Security Testing on Operational Technology

    Staves, A., Gouglidis, A., Maesschalck, S. & Hutchison, D., 30/06/2024, In: Safety Science. 174, 106481.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Cross-layer Framework for Energy Harvesting-LPWAN Resource Management based on Fuzzy Cognitive Maps and Adaptive Glowworm Swarm Optimization for Smart Forest

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/05/2024, In: IEEE Sensors Journal. 24, 10, p. 17067 - 17079

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Mobility-Aware Split-Federated With Transfer Learning for Vehicular Semantic Communication Networks

    Zheng, G., Ni, Q., Navaie, K., Pervaiz, H., Min, G., Kaushik, A. & Zarakovitis, C., 15/05/2024, In: IEEE Internet of Things Journal. 11, 10, p. 17237-17248 12 p., 10.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs

    Lam, C. C., Song, Y., Cao, Y., Zhang, Y., Cai, B. & Ni, Q., 15/05/2024, In: IEEE Internet of Things Journal. 11, 10, p. 18619-18634 16 p., 10.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...21 Next

Back to top