A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data
Guest Editorial: Advances in Secure Distributed and Network-Based Computing
Verifying Group Authentication Protocols by Scyther
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions
Robust Decentralized Dierentially Private Stochastic Gradient Descent
Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs
Using Visualizations to Enhance Users’ Understanding of App Activities on Android Devices