Is proportional fair scheduling suitable for age-sensitive traffic?
Proportional Fair (PF) scheduling with successful deployments in various cellular wireless networks and wireless LANs, aims at maximizing the sum of the logarithms of user throughputs. PF scheduling is known to strike an appropriate ...
Privacy-preserving edge caching: A probabilistic approach
Edge caching (EC) decreases the average access delay of end-users through caching popular content at the edge of the network, however, it increases the leakage probability of valuable information such as users’ preferences. Most of the ...
Secure upgraded spatial modulation for wireless transmission systems
Physical layer security (PLS) is gaining traction as a potent supplement, if not a complete replacement for encryption-based secure communication systems. The PLS strategy with secret key generation using physical signatures and a ...
Knacks of a hybrid anomaly detection model using deep auto-encoder driven gated recurrent unit
- Feature extraction of NSL-KDD dataset is carried out exploiting deep auto-encoders.
The cyber-attacks have recently posed a threat to national security; meanwhile, the pervasiveness of malware and cyber terrorism encumbers the beneficial utilization of the internet. Intrusion detection systems (IDS) can prevent such ...
Dominant coverage for target users at the lowest cost under competitive propagation in social networks
Multiple pieces of information disseminated in social networks can create a competitive environment where the influence of each message will be reduced. Thus, how to increase the influence under competitive propagation is significant ...
Highlights
- To make the dissemination targeted and the revenue maximized, we propose the lowest cost problem to achieve dominant coverage for target users under ...
A reliable and fair federated learning mechanism for mobile edge computing
Federated learning-enabled mobile edge computing implements privacy-preserving collaborative machine learning of complex models. However, mobile end devices have high mobility and are vulnerable to be corrupted due to exposuring to an ...
An optimum localization approach using hybrid TSNMRA in 2D WSNs
Wireless Sensor Network (WSN) localization has grown in importance in the research community over the last several decades. Finding the exact position of an event is necessary for many applications, including tracking objects, animals, ...
A novel predictive approach for mobility activeness in mobile wireless networks
Nowadays, mobile computing has become a key component of telecommunication systems, and the Open Systems Interconnection (OSI) layer operations are affected by the effects of node movements along the roads, from the physical to the ...
ODM-BCSA: An Offloading Decision-Making Framework based on Binary Cuckoo Search Algorithm for Mobile Edge Computing
Computational task offloading facilitates real-time applications on constrained mobile devices that require a large amount of processing resources, high storage capacity and battery power. Mobile Edge Computing (MEC) is a computing ...
Hybrid in-network computing and distributed learning for large-scale data processing
- HINC, which uses a dynamic selection algorithm (DSA)-based clustering algorithm that dynamically selects clusters and models, considering the data traffic ...
Recently, the value of big data generated, processed, and shared by mobile devices and intelligent Internet of Things devices has significantly increased. The speed of data generation is accelerating, and the amount of data that needs ...
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs
In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be improved through message interaction and sharing between vehicle users, which inevitably depends on secure identity authentication and message ...
A survey on sliding window sketch for network measurement
As an important basis for network management, effective network measurement is critical for improving network performance and security. As an efficient tool for network measurement, sketch is a probabilistic data structure which can ...
TrackSign-labeled web tracking dataset
Recent studies [8] show that more than 95% of the websites available on the Internet contain at least one of the so-called web tracking systems. These systems are specialized in identifying their users by means of a plethora of ...