default search action
Digital Communications and Networks, Volume 9
Volume 9, Number 1, February 2023
- Shahid Mumtaz
, Gautam Srivastava, Wei Wei:
Special issue on machine learning-driven big data and blockchain techniques for communication. 1-2 - Chunying Zhang, Jing Ren, Lu Liu, Shouyue Liu, Xiaoqi Li, Liya Wang:
Set pair three-way overlapping community discovery algorithm for weighted social internet of things. 3-13 - Pengcheng Wei, Bo Wang
, Xiaojun Dai
, Li Li, Fangcheng He:
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder. 14-21 - Hongfei Zhang, Li Zhu, Tao Dai, Liwen Zhang, Xi Feng, Li Zhang, Kaiqi Zhang
:
Smart object recommendation based on topic learning and joint features in the social internet of things. 22-32 - Ashwin Verma, Pronaya Bhattacharya, Umesh Bodkhe
, Deepti Saraswat
, Sudeep Tanwar
, Kapal Dev:
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment. 33-46 - Baofeng Ji
, Mingkun Zhang
, Ling Xing, Xiaoli Li, Chunguo Li, Congzheng Han, Hong Wen:
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract. 47-55 - Wanneng Shu, Li Yang:
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks. 56-66 - Aimin Yang, Chaomeng Lu
, Jie Li, Xiangdong Huang, Tianhao Ji, Xichang Li, Yichao Sheng:
Application of meta-learning in cyberspace security: a survey. 67-78 - Varun Kohli
, Sombuddha Chakravarty
, Vinay Chamola
, Kuldip Singh Sangwan
, Sherali Zeadally:
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions. 79-89 - Luo Xianquan
, Chunjiong Zhang
, Longju Bai:
A fixed clustering protocol based on random relay strategy for EHWSN. 90-100 - Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi
, Ali Dehghantanha, Hadis Karimipour:
An ensemble deep learning model for cyber threat hunting in industrial internet of things. 101-110 - Haifeng Lin
, Qilin Xue, Jiayin Feng, Di Bai:
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. 111-124 - Debasmita Mishra
, Bighnaraj Naik, Janmenjoy Nayak
, Alireza Souri
, Pandit Byomakesha Dash, S. Vimal
:
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network. 125-137 - Yueshen Xu
, Zhiying Wang, Honghao Gao, Zhiping Jiang, Yuyu Yin, Rui Li:
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things. 138-145 - Aimin Yang, Zezhong Ma
, Chunying Zhang, Yang Han, Zhibin Hu, Wei Zhang, Xiangdong Huang, Yafeng Wu:
Review on application progress of federated learning model and security hazard protection. 146-158
- Xiaoling Huang, Youxia Dong
, Guodong Ye
, Wun-She Yap
, Bok-Min Goi:
Visually meaningful image encryption algorithm based on digital signature. 159-165 - Milan Groshev
, Gabriele Baldoni
, Luca Cominardi
, Antonio de la Oliva
, Robert Gazda
:
Edge robotics: are we ready? an experimental evaluation of current vision and future directions. 166-174 - Ennio Gambi, Linda Senigagliesi
, Andrea Barbaresi, Matteo Mellini, Adelmo De Santis:
A WKNN-based approach for NB-IoT sensors localization. 175-182 - Ioanna Roussaki
, Kevin Doolin
, Antonio F. Skarmeta, George Routis, Juan Antonio López-Morales, Ethel Claffey
, Manuel Mora, Juan Antonio Martínez:
Building an interoperable space for smart agriculture. 183-193 - Francesco Buccafurri
, Gianluca Lax
, Lorenzo Musarella
, Antonia Russo
:
An Ethereum-based solution for energy trading in smart grids. 194-202 - Xiaonan Wang, Xilan Chen, Xingwei Wang:
Secure vehicular data communication in Named Data Networking. 203-210 - Heba Saleous, Muhusina Ismail, Saleh H. Aldaajeh
, Nisha Madathil
, Saed Alrabaee
, Kim-Kwang Raymond Choo, Nabeel Al-Qirim:
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. 211-222 - Denzil Furtado
, André F. Gygax
, Chien Aun Chan
, Ashley I. Bush
:
Time to forge ahead: The Internet of Things for healthcare. 223-235 - Hamid Taramit
, Luis Orozco-Barbosa
, Abdelkrim Haqiq
:
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism. 236-251 - Abuzar B. M. Adam
, Xiaoyu Wan, Zhengqiang Wang
:
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems. 252-263 - Wali Ullah Khan
, Furqan Jameel, Asim Ihsan
, Omer Waqar, Manzoor Ahmed
:
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks. 264-269 - Jesús Sánchez Gómez
, Rafael Marín-Pérez
, Ramon Sanchez-Iborra, Miguel Angel Zamora
:
MEC-based architecture for interoperable and trustworthy internet of moving things. 270-279 - Rui Liu
, Jianping Pan:
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring. 280-291
Volume 9, Number 2, April 2023
- Fazlullah Khan
, Joel J. P. C. Rodrigues, Mian Ahmad Jan:
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications. 293-295 - Jing Zhang, Qichen Yan, Xiaogang Zhu
, Keping Yu
:
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine. 296-305 - Han Wang
, Fida Hussain Memon
, Xianpeng Wang
, Xingwang Li
, Ning Zhao
, Kapal Dev:
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach. 306-312 - YeEun Kim, Junggab Son
, Reza M. Parizi
, Gautam Srivastava
, Heekuck Oh:
3-Multi ranked encryption with enhanced security in cloud computing. 313-326 - Xiang Wu, Huanhuan Wang, Yongting Zhang, Ruirui Li:
A secure visual framework for multi-index protection evaluation in networks. 327-336 - Weizheng Wang
, Huakun Huang
, Zhimeng Yin, Thippa Reddy Gadekallu
, Mamoun Alazab, Chunhua Su:
Smart contract token-based privacy-preserving access control system for industrial Internet of Things. 337-346 - Jun Liu
, Kai Qian, Zhibao Qin, Mohammad Dahman Alshehri
, Qiong Li, Yonghang Tai:
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access. 347-357 - Chintan Patel
, Ali Kashif Bashir
, Ahmad Ali AlZubi
, Rutvij H. Jhaveri
:
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element. 358-366 - Qusay Medhat Salih
, Md. Arafatur Rahman
, A. Taufiq Asyhari, Muhammad Kamran Naeem
, Mohammad N. Patwary, Ryan Alturki
, Mohammed Abdulaziz Ikram:
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications. 367-382 - Bello Musa Yakubu
, Majid Iqbal Khan
, Abid Khan
, Farhana Jabeen, Gwanggil Jeon:
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. 383-392 - Saeid Yazdanpanah, Saman Shojae Chaeikar
, Alireza Jolfaei:
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare. 393-399 - Lingwei Xu
, Hao Yin, Hong Jia, Wenzhong Lin, Xinpeng Zhou, Yong Fu, Xu Yu
:
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks. 400-410 - Anichur Rahman
, Md. Jahidul Islam, Shahab S. Band, Ghulam Muhammad
, Kamrul Hasan
, Prayag Tiwari
:
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. 411-421 - Nilesh Kumar Jadav
, Riya Kakkar, Harsh Mankodiya
, Rajesh Gupta, Sudeep Tanwar
, Smita Agrawal
, Ravi Sharma:
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G. 422-435 - Bahar Farahani, Amin Karimi Monsefi
:
Smart and collaborative industrial IoT: A federated learning and data space approach. 436-447
- Jianhui Lv, Yuhui Shi, Hui Cheng, Zhiwei Lin, Lianbo Ma:
Guest editorial: AI and edge computing driven technologies and applications. 448-449 - Kuanishbay Sadatdiynov
, Laizhong Cui
, Lei Zhang, Joshua Zhexue Huang, Salman Salloum
, Mohammad Sultan Mahmud
:
A review of optimization methods for computation offloading in edge computing networks. 450-461 - Qing Li
, He Huang, Yong Jiang, Jingpu Duan:
AdaptNF: Adaptive service chain scheduling with stateless migration and NF consolidation. 462-472 - Jiabao Wen, Jiachen Yang
, Tianying Wang, Yang Li
, Zhihan Lv:
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing. 473-482 - Ziqiao Wang, Xiaomu Cai
:
Teaching mechanism empowered by virtual simulation: Edge computing-driven approach. 483-491 - Jie Li, Zhiping Yang, Xingwei Wang, Yichao Xia, Shijian Ni:
Task offloading mechanism based on federated reinforcement learning in mobile edge computing. 492-504 - Yumin Shen, Hongyu Guo
:
Research on high-performance English translation based on topic model. 505-511
- Zhao Li
, Pintian Lyu
, Jun Li, Zhixian Chang, Jia Liu
, Zheng Yan:
SCIM: Incorporating secure communication and interference management in one operation. 512-522 - Yunpeng Zhang
, Luliang Jia
, Nan Qi, Yifan Xu
, Meng Wang:
Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach. 523-533 - Amin Jamali
, Mehdi Berenjkoub, Hossein Saidi, Behrouz Shahgholi Ghahfarokhi
:
Survivability evaluation for networks carrying complex traffic flows. 534-544 - Ruyan Wang, Chunyan Zang
, Peng He
, Yaping Cui, Dapeng Wu:
Auction-based profit maximization offloading in mobile edge computing. 545-556 - Souleymane Berthe, Xiaorong Jing
, Hongqing Liu, Qianbin Chen:
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems. 557-566 - Chengcai Wang, Ao Wu, Yueqi Hou, Xiaolong Liang, Luo Xu, Xiaomo Wang:
Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms. 567-579 - Xiaoge Huang, Zhi Chen, Qianbin Chen, Jie Zhang
:
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks. 580-589 - Hongcheng Huang
, Peixin Ye, Min Hu, Jun Wu:
A multi-point collaborative DDoS defense mechanism for IIoT environment. 590-601
- Qing Xue, Gang Feng:
Erratum to "A robust beam tracking scheme for millimeter wave HetNets" [Digit. Commun. Network. 8 (6) (2022) 1115-1121]. 602
Volume 9, Number 3, June 2023
- Peng Zheng
, Jianwen Ding, Dan Fei, Jiayi Zhang, Bo Ai, Xiao Li
, Shi Jin, Tiejun Cui:
Field trial measurement and channel modeling for reconfigurable intelligent surface. 603-612 - Guang Chen
, Yueyun Chen, Zhiyuan Mai
, Conghui Hao, Meijie Yang, Shuangshuang Han, Liping Du:
Joint multiple resource allocation for offloading cost minimization in IRS-assisted MEC networks with NOMA. 613-627 - Xiaoting Ma
, Junhui Zhao, Jieyu Liao
, Ziyang Zhang:
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks. 628-637 - Wenwan Xu, Jun Zhang
, Shu Cai
, Jue Wang, Yi Wu
:
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI. 638-644 - Zining Wang, Min Lin, Shupei Huang, Ming Cheng, Wei-Ping Zhu, Yan Guo:
Robust beamforming for IRS-aided SWIPT in cognitive radio networks. 645-654 - Peixu Liu, Gang Jing, Hongwu Liu, Liang Yang, Theodoros A. Tsiftsis
:
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems. 655-666 - Ziyang Lu
, Yubin Zhao
, Xiaofan Li:
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer. 667-676
- Leonardo Bertolin Furstenau, Yan Pablo Reckziegel Rodrigues, Michele Kremer Sott
, Pedro Leivas, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo
:
Internet of things: Conceptual network structure, main challenges and future directions. 677-687 - Zhuo Chen, Peihong Wei, Yan Li:
Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud. 688-697 - Weidong Yang, Erbo Shen
, Xuyu Wang
, Shiwen Mao
, Yuehong Gong
, Pengming Hu
:
Wi-Wheat+: Contact-free wheat moisture sensing with commodity WiFi based on entropy. 698-709 - Mojtaba Alizadeh, Mohammad Hesam Tadayon
, Alireza Jolfaei
:
Secure ticket-based authentication method for IoT applications. 710-716 - Junjie Ding, Yuxuan Tan, Yanyi Wang
, Jiao Zhang, Menghui He, Feng Zhao
, Li Zhao, Wen Zhou, Yiwei Shi, Min Zhu, Jianjun Yu:
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber. 717-722 - Tongyu Song, Xuebin Tan, Jing Ren, Wenyu Hu, Sheng Wang
, Shizhong Xu, Xiong Wang, Gang Sun, Hongfang Yu:
DRAM: A DRL-based resource allocation scheme for MAR in MEC. 723-733 - Zhixin Liu
, Jiawei Su, Yuanai Xie
, Yazhou Yuan, Yi Yang, Xinping Guan:
Distributed robust power control in two-tier vehicle networks under uncertain channel environments. 734-742 - Keliang Du, Luhan Wang
, Xiangming Wen, Yu Liu, Haiwen Niu
, Shaoxin Huang:
ML-SLD: A message-level stateless design for cloud-native 5G core network. 743-756 - Yangpeng Dan
, Jianxin Yi
, Xianrong Wan
, Yunhua Rao
, Yan Liu:
A robust symbol timing strategy for cellular systems. 757-768 - Ao Li
, Taihai Yang, Wenxin Wu, Lei Luo
:
Soft transmission of 3D video for low power and low complexity scenario. 769-778 - Weimin Kang
:
Nonbinary ldpc-coded probabilistic shaping scheme for MIMO systems based on signal space diversity. 779-787 - Miaona Huang, Jun Chen
:
A novel proactive soft load balancing framework for ultra dense network. 788-796 - Pengfei Du
, Hongjiang Lei
, Imran Shafique Ansari
, Jianbo Du, Xiaoli Chu
:
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks. 797-808
Volume 9, Number 4, August 2023
- Lupeng Zhang
, Pingchuan Wang
, Yuming Zhang, Zongzheng Chi
, Ning Tong, Lei Wang, Fengqi Li
:
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT. 809-816 - Ye Zhu, Zhiqiang Liu, Peng Wang
, Chenglie Du:
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G. 817-826 - Jianlong Zhang, Guangzu Fang, Bin Wang, Xiaobo Zhou, Qingqi Pei, Chen Chen
:
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network. 827-835 - Siguang Chen
, Bei Tang, Kun Wang:
Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT. 836-845 - Junlin Zhang, Mingqian Liu
, Nan Zhao, Yunfei Chen, Qinghai Yang, Zhiguo Ding:
Spectrum and energy efficient multi-antenna spectrum sensing for green UAV communication. 846-855
- Leonardo Bertolin Furstenau, Pedro Leivas
, Michele Kremer Sott
, Michael S. Dohan, José Ricardo López-Robles
, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo
:
Big data in healthcare: Conceptual network structure, key challenges and opportunities. 856-868 - Jalaluddin Qureshi
, Chuan Heng Foh:
Triangular code: Near-optimal linear time fountain code. 869-878 - Adel Aldalbahi, Nazli Siasi, Asim Mazin
, Mohammed A. Jasim
:
Digital compass for multi-user beam access in mmWave cellular networks. 879-886 - Yuwen Liu
, Rongju Yao
, Song Jia, Fan Wang
, Ruili Wang
, Rui Ma
, Lianyong Qi:
A label noise filtering and label missing supplement framework based on game theory. 887-895 - Entong Meng, Xiangyuan Bu, Jihong Yu
, Jianping An, Xuanhe Yang:
Robust or nonrobust: On MC-DS-CDMA acquisition in LEO satellite communications. 896-905 - Yizhou Shen
, Shigen Shen
, Qi Li, Haiping Zhou, Zongda Wu
, Youyang Qu:
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. 906-919 - Yingzhe Luo
, Jianhao Hu:
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system. 920-930 - Linlin Feng, Zhizhong Zhang, Haonan Hu, Errong Pei:
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process. 931-940 - Gabriel Francisco Lorençon Ribeiro Bernardes, Rogério Ishibashi
, André A. S. Ivo
, Valério Rosset, Bruno Yuji Lino Kimura
:
Prototyping low-cost automatic weather stations for natural disaster monitoring. 941-956 - Shi Dong
, Yuanjun Xia:
Network traffic identification in packet sampling environment. 957-970 - Tianci Zhang
, Junjie Zhou, Zhengchuan Chen
, Zhong Tian
, Wanli Wen, Yunjian Jia:
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation. 971-980 - Jiale Zhang
, Yue Liu
, Di Wu
, Shuai Lou, Bing Chen
, Shui Yu
:
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems. 981-989 - Duo Wu
, Lin Cui
:
A comprehensive survey on Segment Routing Traffic Engineering. 990-1008 - Peppino Fazio
, Miralem Mehic
, Miroslav Voznák
:
Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view. 1009-1022 - Yuchao Zhu
, Shaowei Wang:
Traffic prediction enabled dynamic access points switching for energy saving in dense networks. 1023-1031
Volume 9, Number 5, October 2023
- Muhammad Ali Naeem
, Yousaf Bin Zikria
, Rashid Ali
, Usman Tariq, Yahui Meng
, Ali Kashif Bashir
:
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective. 1033-1052 - Yilei Wang, Zhaojie Wang
, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen
, Minghao Zhao
:
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems. 1053-1060 - Yang Li
, Jiachen Yang
, Jiabao Wen:
Entropy-based redundancy analysis and information screening. 1061-1069 - Zhenjiang Qian
, Rui Xia, Gaofei Sun, Xiaoshuang Xing, Kaijian Xia:
A measurable refinement method of design and verification for micro-kernel operating systems in communication network. 1070-1079 - Neha Garg
, Rajat Petwal, Mohammad Wazid
, Devesh Pratap Singh, Ashok Kumar Das
, Joel J. P. C. Rodrigues:
On the design of an AI-driven secure communication scheme for internet of medical things environment. 1080-1089 - Tun Li, Yanbing Liu, Qilie Liu, Wei Xu, Yunpeng Xiao, Hong Liu
:
A malware propagation prediction model based on representation learning and graph convolutional networks. 1090-1100 - Xiancui Xiao, Xiangwei Zheng
, Ji Bian, Cun Ji, Xinchun Cui:
A dynamic and resource sharing virtual network mapping algorithm. 1101-1112 - Tejasvi Alladi, Varun Kohli
, Vinay Chamola
, F. Richard Yu:
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. 1113-1122 - Abbas Yazdinejad
, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava
, Reza M. Parizi
:
Accurate threat hunting in industrial internet of things edge devices. 1123-1130 - Tehsin Kanwal, Hasina Attaullah
, Adeel Anjum, Abid Khan
, Gwanggil Jeon:
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. 1131-1140 - Xia Lei, Yongkai Fan, Xiong-Lin Luo:
On fine-grained visual explanation in convolutional neural networks. 1141-1147
- Qasim Jan
, Shahid Hussain
, Zhiwen Pan, Nan Liu
, Zakir Ali
, Zechen Liu, Xiaohu You:
Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes. 1148-1156 - Qiang Wang
, Hao Jiang, Ying Jiang, Shuwen Yi, Qi Nie, Geng Zhang:
Multiplex network infomax: Multiplex network embedding via information fusion. 1157-1168 - Guangquan Xu
, Wenyu Dong
, Jun Xing, Wenqing Lei
, Jian Liu, Lixiao Gong, Meiqi Feng
, James Xi Zheng
, Shaoying Liu:
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection. 1169-1179 - Xin Liu
, Liang Zheng
, Sumi Helal, Weishan Zhang
, Chunfu Jia, Jiehan Zhou:
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs. 1180-1189 - Anqi Meng
, Guandong Wei
, Yao Zhao
, Xiaozheng Gao, Zhanxin Yang:
Green resource allocation for mobile edge computing. 1190-1199 - Bin Cao, Tingyong Wu
, Xiang Bai:
Stochastic programming based multi-arm bandit offloading strategy for internet of things. 1200-1211 - Junwei Wang, Xianglin Wei
, Jianhua Fan, Qiang Duan, Jianwei Liu
, Yangang Wang:
Request pattern change-based cache pollution attack detection and defense in edge computing. 1212-1220 - Weishan Zhang
, Xiao Chen
, Ke He, Leiming Chen
, Liang Xu, Xiao Wang
, Su Yang:
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting. 1221-1229 - Jingyuan Duan, Ling Tian, Jianqiao Mao
, Jiaxin Li:
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions. 1230-1241
Volume 9, Number 6, December 2023
- Weiwei Jiang
:
Software defined satellite networks: A survey. 1243-1264 - Homayun Kabir
, Mau-Luen Tham
, Yoong Choon Chang:
Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions. 1265-1290 - Jienan Chen, Jiyun Tao, Siyu Luo, Shuai Li, Chuan Zhang, Wei Xiang
:
A deep learning driven hybrid beamforming method for millimeter wave MIMO system. 1291-1300 - Alex Medeiros de Araújo, Anderson Bergamini de Neira
, Michele Nogueira:
Autonomous machine learning for early bot detection in the internet of things. 1301-1309 - Shumei Liu, Yao Yu
, Lei Guo, Phee Lep Yeoh, Branka Vucetic, Yonghui Li:
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks. 1310-1318 - Hui-Ping Yin, Chao Bai, Haipeng Ren:
Echo state network based symbol detection in chaotic baseband wireless communication. 1319-1330 - Shuo Yuan
, Mugen Peng
, Yaohua Sun, Xiqing Liu:
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges. 1331-1339 - Mihailo Vesovic, Aleksandra Smiljanic, Dusan Kostic:
Fast and scalable routing protocols for data center networks. 1340-1350 - Jinfang Jiang, Chuan Lin
, Guangjie Han
, Adnan M. Abu-Mahfouz
, Syed Bilal Hussain Shah, Miguel Martínez-García:
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities. 1351-1362 - Shahriar Kaisar
, Joarder Kamruzzaman
, Gour C. Karmakar, Md. Mamunur Rashid:
Decentralized content sharing in mobile ad-hoc networks: A survey. 1363-1398 - Shuang Liu, Jie Tian
, Chao Zhai
, Tiantian Li:
Joint computation offloading and resource allocation in vehicular edge computing networks. 1399-1410 - Yajie He, Chonghui Xiao, Shuai Wang, Yun-Hao Liu
, Zhaoyuan Xu, Haoquan Zhou, Min Zhao, Wei Gong:
Smart all-time vision: The battery-free video communication for urban administration and law enforcement. 1411-1420 - Chu Chu
, Guangjun Wen, Jianyu Niu:
Efficient and robust missing key tag identification for large-scale RFID systems. 1421-1433 - Zezhou Luo, Hongcheng Zhuang:
A novel fractional uplink power control framework for self-organizing networks. 1434-1440 - Chenquan Gan
, Jinhui Yao, Shuaiying Ma, Zufan Zhang, Lianxiang Zhu
:
The deep spatiotemporal network with dual-flow fusion for video-oriented facial expression recognition. 1441-1447 - Haohao Wang, Mengmeng Sun, Lianming Zhang
, Pingping Dong, Yehua Wei, Jing Mei:
Scheduling optimization for upstream dataflows in edge computing. 1448-1457 - Hemant Kumar Narsani, Ali Ranjha, Kapal Dev
, Fida Hussain Memon
, Nawab Muhammad Faseeh Qureshi
:
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems. 1458-1464 - Long Zhang, Bin Cao, Gang Feng:
Opportunistic admission and resource allocation for slicing enhanced IoT networks. 1465-1476 - Chuhuan Liu, Yi Zhang
, Guohang Niu, Luliang Jia
, Liang Xiao
, Jiangxia Luan:
Towards reinforcement learning in UAV relay for anti-jamming maritime communications. 1477-1485 - Abel Efetobor Edje, Shaffie Muhammad Abd Latiff, Weng Howe Chan:
IoT data analytic algorithms on edge-cloud infrastructure: A review. 1486-1515
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.