Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 226, Issue CMay 2023
Publisher:
  • Elsevier North-Holland, Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISSN:1389-1286
Reflects downloads up to 25 Nov 2024Bibliometrics
Skip Table Of Content Section
Research Articles
research-article
Is proportional fair scheduling suitable for age-sensitive traffic?
Abstract

Proportional Fair (PF) scheduling with successful deployments in various cellular wireless networks and wireless LANs, aims at maximizing the sum of the logarithms of user throughputs. PF scheduling is known to strike an appropriate ...

research-article
Privacy-preserving edge caching: A probabilistic approach
Abstract

Edge caching (EC) decreases the average access delay of end-users through caching popular content at the edge of the network, however, it increases the leakage probability of valuable information such as users’ preferences. Most of the ...

research-article
Secure upgraded spatial modulation for wireless transmission systems
Abstract

Physical layer security (PLS) is gaining traction as a potent supplement, if not a complete replacement for encryption-based secure communication systems. The PLS strategy with secret key generation using physical signatures and a ...

research-article
Knacks of a hybrid anomaly detection model using deep auto-encoder driven gated recurrent unit
Highlights

  • Feature extraction of NSL-KDD dataset is carried out exploiting deep auto-encoders.

Abstract

The cyber-attacks have recently posed a threat to national security; meanwhile, the pervasiveness of malware and cyber terrorism encumbers the beneficial utilization of the internet. Intrusion detection systems (IDS) can prevent such ...

research-article
Dominant coverage for target users at the lowest cost under competitive propagation in social networks
Abstract

Multiple pieces of information disseminated in social networks can create a competitive environment where the influence of each message will be reduced. Thus, how to increase the influence under competitive propagation is significant ...

Highlights

  • To make the dissemination targeted and the revenue maximized, we propose the lowest cost problem to achieve dominant coverage for target users under ...

research-article
A reliable and fair federated learning mechanism for mobile edge computing
Abstract

Federated learning-enabled mobile edge computing implements privacy-preserving collaborative machine learning of complex models. However, mobile end devices have high mobility and are vulnerable to be corrupted due to exposuring to an ...

research-article
An optimum localization approach using hybrid TSNMRA in 2D WSNs
Abstract

Wireless Sensor Network (WSN) localization has grown in importance in the research community over the last several decades. Finding the exact position of an event is necessary for many applications, including tracking objects, animals, ...

research-article
A novel predictive approach for mobility activeness in mobile wireless networks
Abstract

Nowadays, mobile computing has become a key component of telecommunication systems, and the Open Systems Interconnection (OSI) layer operations are affected by the effects of node movements along the roads, from the physical to the ...

research-article
ODM-BCSA: An Offloading Decision-Making Framework based on Binary Cuckoo Search Algorithm for Mobile Edge Computing
Abstract

Computational task offloading facilitates real-time applications on constrained mobile devices that require a large amount of processing resources, high storage capacity and battery power. Mobile Edge Computing (MEC) is a computing ...

research-article
Hybrid in-network computing and distributed learning for large-scale data processing
Highlights

  • HINC, which uses a dynamic selection algorithm (DSA)-based clustering algorithm that dynamically selects clusters and models, considering the data traffic ...

Abstract

Recently, the value of big data generated, processed, and shared by mobile devices and intelligent Internet of Things devices has significantly increased. The speed of data generation is accelerating, and the amount of data that needs ...

Review Article
review-article
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs
Abstract

In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be improved through message interaction and sharing between vehicle users, which inevitably depends on secure identity authentication and message ...

Survey Article
article
A survey on sliding window sketch for network measurement
Abstract

As an important basis for network management, effective network measurement is critical for improving network performance and security. As an efficient tool for network measurement, sketch is a probabilistic data structure which can ...

Data Article
article
TrackSign-labeled web tracking dataset
Abstract

Recent studies [8] show that more than 95% of the websites available on the Internet contain at least one of the so-called web tracking systems. These systems are specialized in identifying their users by means of a plethora of ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.