| User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection |
42 |
| AI and Blockchain: A Disruptive Integration |
19 |
| KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research |
15 |
| Toward Human-Understandable, Explainable AI |
14 |
| Deep Learning for the Internet of Things |
13 |
| The Age of Social Sensing |
13 |
| Deep Learning for Human Activity Recognition in Mobile Computing |
11 |
| IoT as a Land of Opportunity for DDoS Hackers |
11 |
| Programming Spiking Neural Networks on Intel's Loihi |
10 |
| Intrusion Detection in the Era of loT: Building Trust via Traffic Filtering and Sampling |
10 |
| Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks |
9 |
| Malice Domestic: The Cambridge Analytica Dystopia |
7 |
| TrueNorth: Accelerating From Zero to 64 Million Neurons in 10 Years |
7 |
| The Age of Artificial Emotional Intelligence |
6 |
| Using Blockchain for Provenance and Traceability in Internet of Things-Integrated Food Logistics |
6 |
| Penetration Testing in the IoT Age |
6 |
| On the Use of Stray Wireless Signals for Sensing: A Look Beyond 5G for the Next Generation of Industry |
5 |
| Predicting Personality Traits From Physical Activity Intensity |
5 |
| Securing Gadget-Free Digital Service |
5 |
| Accountability in the IoT: Systems, Law, and Ways Forward |
5 |
| End-to-End Trust and Security for Internet of Things Applications |
5 |
| From Brexit to Trump: Social Media's Role in Democracy |
5 |
| Using eMMA to Manage Medication |
5 |
| Accurate Indoor Location for the IoT |
5 |
| Standards: Roadmapping Computer Technology Trends Enlightens Industry |
4 |
| Future Millimeter-Wave Indoor Systems: A Blueprint for Joint Communication and Sensing |
4 |
| Architecting E-Coaching Systems: A First Step for Dealing with Their Intrinsic Design Complexity |
4 |
| Cybertrust in the IoT Age |
4 |
| Toward Ubiquitous Operating Systems: A Software-Defined Perspective |
4 |
| Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning |
4 |
| Cloud Futurology |
3 |
| The Deep (Learning) Transformation of Mobile and Embedded Computing |
3 |
| Cyberthreats under the Bed |
3 |
| Really Small Shoe Boxes: On Realistic Quantum Resource Estimation |
3 |
| A Hybrid Approach for Solving Optimization Problems on Small Quantum Computers |
3 |
| Security Issues in Named Data Networks |
3 |
| I/O cloud: Adding an IoT Dimension to Cloud Infrastructures |
3 |
| Online Advertising Fraud |
3 |
| Interactive Visual Event Analytics: Opportunities and Challenges |
3 |
| Redefining Data Transparency: A Multidimensional Approach |
3 |
| Smart City Development With Urban Transfer Learning |
3 |
| Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution |
3 |
| Practical Drone Delivery |
3 |
| Network-Level Security for the Internet of Things: Opportunities and Challenges |
3 |
| Toward Anthropomorphic Machine Learning |
3 |
| Osmosis: The Osmotic Computing Platform for Microelements in the Cloud, Edge, and Internet of Things |
3 |
| The Harmonization of Accessibility Standards for Public Policies |
3 |
| Language Service Infrastructure on the Web: The Language Grid |
3 |
| Practical Annealing-Based Quantum Computing |
2 |
| Social Media-based Conversational Agents for Health Management and Interventions |
2 |