
Volume 27, Issue 2 (2022)
Research Articles
Efficient Top/Bottom-
Jinbao Wang, Zhuojun Duan, Xixian Han, and Donghua Yang
Efficient Publication of Distributed and Overlapping Graph Data Under Differential Privacy
Xu Zheng, Lizong Zhang, Kaiyang Li, and Xi Zeng
Link-Privacy Preserving Graph Embedding Data Publication with Adversarial Learning
Kainan Zhang, Zhi Tian, Zhipeng Cai, and Daehee Seo
Implementation of Abstract MAC Layer Under Jamming
Yifei Zou, Minghui Xu, Dongxiao Yu, Liandong Chen, Shaoyong Guo, and Xiaoshuang Xing
Artificial Intelligence for Edge Service Optimization in Internet of Vehicles: A Survey
Xiaolong Xu, Haoyuan Li, Weijie Xu, Zhongjian Liu, Liang Yao, and Fei Dai
Mobile Multimedia Computing in Cyber-Physical Surveillance Services Through UAV-Borne Video-SAR: A Taxonomy of Intelligent Data Processing for IoMT-Enabled Radar Sensor Networks
Mohammad R. Khosravi and Sadegh Samadi
Research Advances on AI-Powered Thermal Management for Data Centers
Hui Liu, AbdusSalam Aljbri, Jie Song, Jinqing Jiang, and Chun Hua
A Truncated SVD-Based ARIMA Model for Multiple QoS Prediction in Mobile Edge Computing
Chao Yan, Yankun Zhang, Weiyi Zhong, Can Zhang, and Baogui Xin
Heart-Rate Analysis of Healthy and Insomnia Groups with Detrended Fractal Dimension Feature in Edge
Xuefei Wang, Yichao Zhou, and Chunxia Zhao
Secure Scheme for Locating Disease-Causing Genes Based on Multi-Key Homomorphic Encryption
Tanping Zhou, Wenchao Liu, Ningbo Li, Xiaoyuan Yang, Yiliang Han, and Shangwen Zheng
Improved Heuristic Job Scheduling Method to Enhance Throughput for Big Data Analytics
Zhiyao Hu and Dongsheng Li
Underground Pipeline Surveillance with an Algorithm Based on Statistical Time-Frequency Acoustic Features
Tianlei Wang, Jiuwen Cao, Ru Xu, and Jianzhong Wang
An Axiom System of Probabilistic Mu-Calculus
Wanwei Liu, Junnan Xu, David N. Jansen, Andrea Turrini, and Lijun Zhang
Nonnegative Matrix Tri-Factorization Based Clustering in a Heterogeneous Information Network with Star Network Schema
Juncheng Hu, Yongheng Xing, Mo Han, Feng Wang, Kuo Zhao, and Xilong Che
Asymmetric Deep Hashing for Person Re-Identifications
Yali Zhao, Yali Li, and Shengjin Wang
PrivBV: Distance-Aware Encoding for Distributed Data with Local Differential Privacy
Lin Sun, Guolou Ping, and Xiaojun Ye
Automatic Modulation Recognition Based on CNN and GRU
Fugang Liu, Ziwei Zhang, and Ruolin Zhou
Effective Algorithms to Detect Stepping-Stone Intrusion by Removing Outliers of Packet RTTs
Lixin Wang, Jianhua Yang, Michael Workman, and Pengjun Wan