0% found this document useful (0 votes)
29 views42 pages

Trending Topics

The document discusses various applications and technologies related to the Internet of Things (IoT) and machine learning, including federated learning, security mechanisms, and advanced algorithms. It covers topics such as natural language processing, deep learning methods, and digital forensics in the context of IoT and blockchain. Additionally, it highlights the integration of cloud computing, edge computing, and big data analytics in enhancing IoT systems.

Uploaded by

drake.diddy.op
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views42 pages

Trending Topics

The document discusses various applications and technologies related to the Internet of Things (IoT) and machine learning, including federated learning, security mechanisms, and advanced algorithms. It covers topics such as natural language processing, deep learning methods, and digital forensics in the context of IoT and blockchain. Additionally, it highlights the integration of cloud computing, edge computing, and big data analytics in enhancing IoT systems.

Uploaded by

drake.diddy.op
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

IOT Machine learning

IOT Enabling Technologies Natural Language Processing Algorithms and Applications

Service-oriented IoT Architecture Federated Learning for Natural Language Processing

Middleware Technologies for IoT Federated Learning for Healthcare Data Analytics

Routing Protocols for IoT Machine learning for Cyber security

Mobility-aware RPL for Mobile IoT Federated Learning for Cyber Security

Securing RPL Routing Protocol in IoT Machine Learning in Evolutionary Computation

Congestion Control Mechanisms in COAP Protocol


Machine Learning Methods for Pattern Recognition

DTLS Security for COAP Protocol Recent Advances in Deep Recurrent Neural Networks
Security Mechanisms for COAP Protocol Deep Autoencoder Architecture and Applications

Design and Analysis of MQTT ProtocolAdvanced Deep Learning Methods for Medical Imaging

Security Mechanisms for MQTT Protocol Generative Deel Neural Networks

Data Access Control Framework for IoT Deep Neural Networks for Speech Recognition

DDoS Attack Detection in the IoT Federated Learning for Robotics and Automation

Identity-based Encryption in the IoT Deep Neural Networks for Computer Vision

Lightweight Authentication for the IoT Deep Learning for Data Stream Processing

Ultra-Low-Power Sensing Framework for IoT Deep Learning for Time Series Analysis
Industrial IoT Deep Ensemble Learning

Edge Computing for Industrial IoT Deep Reinforcement Learning

6TiSCH Communication Architecture in Industrial IoT Convolutional Neural Networks

Big Data Management for IoT Deep Learning for Malware Detection System

Internet of Vehicles Federated Learning for Computer Vision


Internet of Everything Federated Learning for Edge Computing

Federated learning for IoT Deep Learning for Recommendation Systems

Internet of Electric Vehicles Deep Learning for Opinion Mining

Internet of Medical Things Federated Learning for Smart City Application

Satellite IoT Medical Machine Learning Algorithms for Healthcare


IoT Cybersecurity Deep Learning for Sentiment Analysis

IoT Future Internet Design Machine Learning for Disease Prediction

IoT Enabled Business Models Deep Learning for Intrusion Detection System

Context-Aware Computing for IoT Deep Learning for Intelligent Wireless Networks

IoT with Next Generation Wireless Systems Deep Learning for Big Data Analytics
IoT with Edge Computing Extreme Learning Machines

IoT with Fog Computing Deep Learning for Intelligent Vehicular Networks

IoT with Blockchain Federated Learning for Vehicular Networks

Internet of Underwater Things Deep Learning for Traffic Congestion Prediction

IoT Smart Applications Dynamic Neural Networks

Privacy Preserving Data Collection in the Optimizing


IoT and Fine-Tuning the Deep Neural Networks
Deep Reinforcement Learning for IoT Deep Learning for Stock Market Prediction

edictive Maintenance for Effective Resource Management in Industrial


Deep Learning
IoT for Autonomous Vehicles

Internet of Multimedia Things Radial Basis Function Networks

Long Short-Term Memory Networks


Restricted Boltzmann Machines

Self Organizing Maps

Personality-aware Recommendation Systems

Transfer Reinforcement Learning

Multi-Goal Reinforcement Learning


Extreme Multi-Label Classification

Generalized Few-Shot Classification

Multimodal Deep Learning

Hierarchical Reinforcement Learning

Multiple Instance Learning


Interpretable Machine Learning
Imitation Learning
Federated Transfer Learning
Contextualized Word Representations
Neural Architecture Search
Meta-Learning
Data, Image, and Text Augmentation
Domain Adaptation for Machine Learning Models
Representation Learning
Object Detection With Deep Learning
Attention Mechanism for Natural Language Processing
Graph Neural Networks
Multi-Objective Evolutionary Federated Learning
Explainable Deep Neural Networks
Evidential Deep Learning
Graph Representation Learning
Research Topics in Graph Convolutional Networks
Hopfield Neural Networks
Quaternion Factorization Machines
Reservoir Computing
Recurrent Neural Networks for Edge Intelligence
Federated Learning for Smart Intrusion Detection Systems
Deep Extreme Classification
Neural Machine Translation
Deep Reinforcement Learning for IoT
Federated Learning for the IoT
Hyperbolic Deep Neural Networks
Few-Shot Class-Incremental Learning
Non-Local Graph Neural Networks
Deep Learning-based Semantic Similarity
Deep Contextual Word Embedding Models for Semantic Similarity
Distributed Active Learning
Triple Generative Adversarial Network
Shallow Broad Neural Network
Pre-training of Deep Bidirectional Transformers for Language Understanding
Federated Learning for Internet of Vehicles
Spiking Neural Networks
Bayesian Neural Networks
digital forensics Blockchain

Forensic Investigation Process Blockchain Standards, Software Tools, and Development

Digital Forensics Investigation Process Models Protocols and Algorithms for Blockchain

Digital Forensic Readiness Blockchain Schemes for Decentralization

Forensic Standardization Smart Contracts in Blockchain

Quality and Legal Standards for Digital Forensics Consensus Mechanisms in Blockchain

Criminal Analysis and Prediction using Machine LearningBlockchain Interoperability

Criminal Network Analysis using Machine Learning Blockchain for Cryptocurrency

Financial Crime Detection Energy Efficiency Issues in Blockchain


Dynamic Malware Analysis Attacks against Blockchain Integrity

Network Forensics Blockchain Algorithms for Security

Mobile Device Forensics Blockchain for Large-scale Applications

Mobile Forensic Readiness Model Blockchain as a Service

Smartphone Forensic Analysis Blockchain Security for IoT

Social Media Forensics for Android Device Blockchain Security for Edge Computing

Evidence Triaging for Mobile Forensics Blockchain for Cybersecurity

Data Integrity-Assured Mobile Forensics Artificial Intelligence for Blockchain-based Applic


Cloud Forensics Investigation Framework Autonomous Trust Management for Blockchain

Evidence Acquisition in Cloud Forensics Privacy Leakage Issue in Blockchain

Cloud Storage Forensics Blockchain for Industrial IoT

Cloud Forensic Readiness Model Blockchain for Internet of Vehicles

Privacy-Preserving Cloud Forensics Model Blockchain for Industry-4.0 Applications


Virtual Machine Introspection for Cloud Forensics Emerging Blockchain Models for Digital Currencie

Logging and Log Synchronization for Cloud Forensics Blockchain Models in Government and Public Serv

Mobile Cloud Forensics Blockchain with Big Data

Machine Learning-assisted Evidence Identification in Mobile Cloud


Permissioned and Permissionless Blockchain Mod

Cloud-based Mobile Application Forensics Blockchain for Decentralized Storage Systems


Mobile Cloud Forensic Process Models Fraud Detection and Prevention of Financial Crime

Big Data Forensic Analysis Distributed Consensus and Fault Tolerance Mecha

Proactive Big Data Analytics for Digital Forensics Performance Analysis and Optimization of Blockc

IoT Forensics

IoT Forensic Readiness


Digital Forensics in Multimedia

Steganalysis for Multimedia Forensics

on Prediction

Neural Networks
tion Systems
arning Models

guage Processing

ated Learning

onal Networks

e Intelligence
Detection Systems

for Semantic Similarity

or Language Understanding
Cloud
Computin
Vehicular Ad Hoc Networks Wireless Sensor Networks g

Federated
Cloud
Computin
Federated Learning for Internet of Veh Clustering Techniques in WSN g

Cloud
Computin
g
Infrastruct
ure for IoT
Data
Mobility Management and Mobil Bio-Inspired Clustering in WSN Processing

Pricing
Models
for Cloud
Computin
Cognitive Radio-based VANET Data Aggregation in WSN g Services

Dynamic
Security
Provisioni
ng in
Artificial Intelligence Techniqu Cluster-based Data Aggregation TechniquCloud

Cloud
Usage
Blockchain Models for VANET Secure Data Aggregation Techniques in Patterns

Cloudlet
Computin
Enhancing emergency vehicle co Energy-efficient MAC protocol for WSN g

Cognitive
Cloud
Computin
Congestion prediction-based eme Mobility Management in WSN g

Container
Computin
Localization System for VANET Sink Mobility for WSN g
Micro
Cloud
Computin
Reinforcement Learning based Ro Energy Efficient Sink Placement for WSN g

Mist
Computin
UAV assisted VANET architecture Underwater Sensor Networks g

Mobile
Ad-Hoc
Cloud
Computin
VANET for Intelligent Transport Routing Protocols for Underwater Sensorg

Serverless
Computin
Vehicle–to–Vehicle Communicat Trust and reputation-based approaches g

Social
Cloud
Computin
Vehicle–to–RSU Communication Intermittently Connected Delay-Tolerant g

Software-
Defined
Computin
Vehicle to Infrastructure Commu Distributed Database Management Techng

Volunteer
Computin
Cellular Networks for Vehicular Airborne Relaying in WSN g

Task
Schedulin
g and
Resource
Allocation
in Cloud
Computin
Cloud Computing for VANET Cooperative Relaying in WSN g
Load
Balancing
in Cloud
Computin
Hybrid Networks for Next Gene Deployment Strategies in WSN g

Heuristic-
based
Load
Balancing
in Cloud
Computin
Smart City Environment for VA Replica Attacks in WSN g

VM
Consolidat
ion based
Load
Balancing
in Cloud
Computin
Security in Service-oriented V Attack Detection and Prevention Schemeg

VM
migration
for Load
Balancing
in Cloud
Computin
Security Issues and Defense Me Efficient Flooding Techniques in WSN g

Virtual
Machine
Selection
and
Placement
in Cloud
Computin
Emergency Communications in Intrusion Detection System for WSN g
Energy
Managem
ent in
Cloud
Computin
Clustering in VANET Congestion control and Avoidance in WS g

Energy-
aware
Task
Schedulin
g in Cloud
Computin
Key Distribution in VANET Cluster-based Routing Techniques in WS g

Energy-
aware
Resource
Allocation
in Cloud
Computin
Safety and Driver Assistance in Anycast Routing in WSN g

Energy
Efficient
Load
Balancing
Technique
s in Cloud
Computin
Authentication in VANET Multicast Routing Techniques in WSN g

Energy
Efficient
VM
Migration
in Cloud
Computin
Trust Management in VANET Context-aware Routing in WSN g
Energy
Efficient
Workflow
Schedulin
g in Cloud
Computin
Privacy Issues in VANET Multipath Routing Protocols for WSN g

Meta-
Heuristic-
based
Energy
Optimizati
on in
Cloud
Computin
Location privacy in VANET Opportunistic Routing in WSN g

Energy-
aware VM
Selection
and
Placement
in Cloud
Computin
Privacy and Trust Management Bio-Inspired Routing Techniques in WSN g

Workload-
aware
Energy
Managem
ent in
Cloud
Computin
Intrusion Detection System in Energy-efficient Routing Protocols in WS g

DVFS-
aware
Server
Consolidat
ion in
Cloud
Computin
Sybil Attack Detection in VANE Cluster-based Intrusion Detection Systemg
Energy-
aware
Resource
Scaling in
Cloud
Computin
Video Streaming in VANET Data Transmission Scheduling Techniquesg

Workflow
Schedulin
g in Cloud
Computin
Routing Protocols for Smart Cit Energy Efficient Sleep and Wake up Schedg

Hybrid
workflow
scheduling
in Cloud
Computin
Intelligent Routing Protocols i Security Attacks and Secure Routing in Wg

Soft
Computin
g
Technique
s in Cloud
Computin
Opportunistic Routing in VANE Lightweight Cryptography algorithms for g

Task
Schedulin
g
Optimizati
on in
Cloud
Computin
Handover Schemes in VANET Lightweight Authentication for WSN g

Resource
allocation
Optimizati
on in
Cloud
Computin
Bio-Inspired Routing in VANET Secure Key Management for WSN g
Hybrid
Metaheuri
stic
Algorithm-
based
Task
Schedulin
g in Cloud
Computin
Scalability Issues in VANET Multichannel protocols for WSN g

Meta-
heuristic
Algorithm-
based
Optimizati
on of
Resource
Allocation
in Cloud
Computin
Congestion Control in VANET Cross-layer protocols for WSN g

Multi-
Objective
Optimizati
on in
Cloud
Computin
Congestion Avoidance in VANE QoS in Wireless Multimedia Sensor Netwg

Meta-
heuristic-
based
Profit
Maximizat
ion in
Cloud
Computin
Data Dissemination in VANET Neighbor Discovery Techniques in WSN g
Meta-
heuristic-
based
Workflow
Schedulin
g in Cloud
Computin
QoS Support in VANET Trust-Based Routing in WSN g

Genetic
Algorithm-
based
Workflow
Schedulin
g in Cloud
Computin
Broadcast Communication in V Connectivity Protocols for WSN g

Scaling of
Cloud
Beaconing in VANET Location Privacy in WSN Resources

Resource
Demand-
based
Allocation
in Cloud
Computin
Street-Centric Routing in VANE Coverage Hole Healing Techniques in WS g

Resource
Pricing for
Profit
Maximizat
ion in
Cloud
Computin
Pseudonym Management in VA Localization Algorithms in WSN g
Resource
Utilization
-based
Schedulin
g and
Traffic Differentiation and Sche Provenance Issues and Management in Allocation

QoS-
aware
Resource
Scaling in
Cloud
Computin
Software-Defined Network in Mobile Sink-based Data Gathering Technig

Game
Theory-
based
Methods
for Cloud
Computin
Internet of Vehicles Secure Data Dissemination Methods in g

Game
Theory-
based VM
Placement
in Cloud
computin
Applications of Game Theory in Coverage and Connectivity Issues in Het g

Cost
Optimizati
on using
Game
Theory in
Cloud
Computin
Deep Reinforcement Learning for Clustering Techniques in Heterogeneous g
Machine
Learning
methods
for Cloud
Computin
Congestion Avoidance in WSN g
Load Balancing in WSN
Fog Computing Edge CompCloud SecuMobile Cl Data MininBig Data

Computational Offloadi Reliable E Cloud Com Offloadi Classifica Big Data Analytics

Scheduling in Fo Priva Securi MCC A Assoc Big Data Models and Algori

Fog Device Virtua Federa Blockc Conte Text Big Data Visualization

Cloud-fog Collab Blockc Secure Machi Topi Big Data Semantics

Adaptive Fog Co Patter Cloud Resou Natur Big Data Analytics for Busines

Green Fog Compu Privac Relia Task Infor Big Data Analytics for Smart

IoT Data Processi Intell Artific Resou Quest Parallel Programming Techniqu

Reliability-aware Comput Intrus Load Socia Software and Tools for Massiv
Delay-aware Fog Artifi Deep L Task Spati Scalable Architectures for Mas

Quality of Experi Place Securi Energ Seman Scalable Storage Systems for

Context-aware F Recurr Encry SLA-a Fraud Cloud Computing Platforms for

Container-based Vi Compu Distri SLA-b Data Large Scale Data Analysis for

Mission-Critical A Edge Real-t SLA-b Financ Database Management System

Proactive Service Edge Securi Meta- Stock Hadoop Programming and Map

Resource Manageme Resou Reliab Game- Netwo Machine Learning Methods fo

Resource Discover Workl Anony Data Sentim Stream Data Processing in Bi


Resource Monitori Virtua Crypto Resou Recom Security and Privacy Issues in

Resource Estimati Load Data C Autom Grap Uncertain Data Management

Profit-aware Reso Profi Data Integrity an Patte Privacy Preserving Big Data A

Load Balancing an Workl Virtualization S Strea Anomaly Detection in Very La

Dynamic Load Bal Quali Confidentiality a Time-Series Data Mining


VM Migration for Resil Security Manag Multimedia Data Mining

VM Selection and Servi Log Security in Cloud

Energy-aware Task Conte Real-time Analysis of Security Log Data for Alert Generation

Energy Efficient R Distri Intrusion Detection System with Event Logging in Cloud

Energy-aware Load Distri Security Monitoring for Virtual Machines in Cloud


Energy-Efficient V Conte Secure Data Segregation and Isolation in Cloud

Application and S Real-t Efficient Searchable Data Encryption in Cloud Storage

Optimization of T Agricu Cryptography and Access Control based Secure Storage in Cl

Optimization of Re Enviro Secure Data Forwarding in Cloud Storage

Multi-Objective O Lightw Privacy Preservation in Public Auditing of Cloud Storage


QoS-aware Control Lightw Key Exchange Privacy Preservation for Cloud

Security and Priv Deep L Data Mining Techniques for Privacy Preservation

Machine Learning-based Privacy Preservation in Cloud


Web Technology Mobile Ad Hoc Networks (MANET)

Web Service frameworks,


Self-Organizing Network Architectures and Protocols

Web Services Model MAC Issues in MANET

Business Process Int Proactive and Reactive Routing Protocols in MANET

Composite Web Servic Geographic Routing Protocols in MANET

Web Service Coordin Opportunistic Routing in MANET

QoS in Web Servic Multicast Routing Protocols in MANET

Multimedia Applicat Multipath Routing in MANET

Resource Managemen Bio-Inspired Routing in MANET


Security in Web Ser Load Balanced Routing in MANET

Semantic Web Serv Link Breakage Prediction Based Routing Protocols

Semantic Web Tech Energy Efficient Routing Protocols in MANET

Ontologies and Ont Reducing Routing Overhead in MANET

Simple Ontologies i Transport Control Protocol Issues in MANET

Simple Protocol an Congestion Control Techniques in MANET

RDF Formal Semant Quality Of Service Support in MANET

Developing the Se Security Attacks in MANET


Methodology for Sem Trust And Reputation Based Approaches in MANET

Using Knowledge Dis Intrusion Detection Mechanisms in MANET

Semantic Annotati Selfish Node Detection in MANET

Approaches to Reaso Defense Mechanism Against Packet Dropping Attacks in MANET

Approaches in Onto Leader Election for Intrusion Detection Systems in MANET


Mapping and Queryi Privacy Preserving Routing in MANET

Ontology for Know Clustering in MANET

Knowledge Access a Data Access Management in MANET

Searching for Sema Cache Management in MANET

Natural Language Ge Cooperative Transmissions in MANET


The Web Services Cyclic MANET

The Web Service M Position Update Schemes in MANET

OWLS Approach Anonymous Routing in MANET

WSDLS Approach Scalable Routing in MANET

Evolutionary Algorithms for Routing in MANET


Flying Ad Hoc Networks

Topology based Routing for Flying Ad Hoc Networks

Geographic Routing Protocols for Flying Ad Hoc Networks

Mobility Models for Flying Ad Hoc Networks

Performance Evaluation of Routing Protocols for Flying Ad Hoc Networks

Mobility Models for MANET


Delay Tolerant Networks

Routing Protocols for Delay Tolerant Networks

Mobility Models for Delay Tolerant Networks

Location Update Schemes for Geographical Routing in MANET


Unmanned Aerial Vehicles

You might also like