Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
Intelligent service migration for the internet of vehicles in edge computing: A mobility-aware deep reinforcement learning framework
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.111021AbstractThe restricted coverage of edge servers in the Internet of Vehicles (IoV) results in service migration as vehicles traverse various regions, potentially escalating operational costs and diminishing service quality. However, existing service ...
- research-articleFebruary 2025
A deep learning sparse urban sensing scheme based on spatiotemporal correlations
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.111015AbstractSparse Mobile Crowdsensing (SMCS) provides vital support for wide-range urban sensing by collecting data from only a few sub-regions and inferring data of unperceived sub-regions based on the spatiotemporal relationships of the collected data. ...
- research-articleFebruary 2025
Model collaboration framework design for space-air-ground integrated networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.111013AbstractThe sixth-generation (6G) of wireless networks is expected to surpass its predecessors by offering ubiquitous coverage of sensing, communication, and computing by the deployment of space-air-ground integrated networks (SAGINs). In SAGINs, aerial ...
- research-articleFebruary 2025
Minimizing active nodes in MEC environments: A distributed learning-driven framework for application placement
- Claudia Torres-Pérez,
- Estefanía Coronado,
- Cristina Cervelló-Pastor,
- Javier Palomares,
- Estela Carmona-Cejudo,
- Muhammad Shuaib Siddiqui
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.111008AbstractApplication placement in Multi-Access Edge Computing (MEC) must adhere to service level agreements (SLAs), minimize energy consumption, and optimize metrics based on specific service requirements. In distributed MEC system environments, the ...
Graphical abstractDisplay Omitted
Highlights- Distributed Deep Reinforcement Learning based Capacity-Aware Application Placement.
- Reduction of the number of active edge nodes and compliance with SLA.
- Vertical application deployment impact on the application placement approach.
- research-articleFebruary 2025
Non-cooperative multi-agent deep reinforcement learning for channel resource allocation in vehicular networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.111006AbstractVehicle-to-vehicle (V2V) communication is a critical technology in supporting vehicle safety applications in vehicular networks. The high mobility in vehicular networks makes the channel state change rapidly, which poses significant challenges to ...
-
- research-articleFebruary 2025
An intention-driven task offloading strategy based on imitation learning in pervasive edge computing
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110998AbstractConsider an infrastructure-less wireless network environment (e.g., a land battlefield) in which devices are characterized by varying resource configurations, dynamic mobility, complexity of the generated sensing tasks, and deterministic delay ...
- research-articleFebruary 2025
ABUV: Adaptive bitrate and upsampling for video streaming on mobile devices
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110994AbstractFueled by the popularity of mobile devices, mobile channels have become the preferred video delivery medium. However, users often encounter a poor quality of experience (QoE) due to bandwidth limitations, despite the implementation of adaptive ...
- research-articleFebruary 2025
FedMP: A multi-pronged defense algorithm against Byzantine poisoning attacks in federated learning
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110990AbstractFederated learning (FL) is an increasingly popular privacy-preserving collaborative machine learning paradigm that enables clients to train a global model collaboratively without sharing their raw data. Despite its advantages, FL is vulnerable to ...
- research-articleFebruary 2025
Coordinated multi-point by distributed hierarchical active inference with sensor feedback
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110989AbstractThis study focuses on cooperative beamforming among base stations in wireless communication technology and proposes a new approach based on the Free Energy Principle (FEP). Traditionally, the trade-off between the accuracy of channel information ...
- research-articleFebruary 2025
Deep reinforcement learning with dual-Q and Kolmogorov–Arnold Networks for computation offloading in Industrial IoT
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110987AbstractIn the industrial internet of things, the rapid development of smart mobile devices and 5G network technology has driven the application of mobile edge computing, reducing the delay in task computation offloading to some extent. However, the ...
Highlights- We utilized Voronoi diagrams to divide service management areas of edge servers, improving offloading efficiency.
- We developed a PCA-based offloading security evaluation model (PCA-OSEM) to analyze key factors affecting offloading ...
- research-articleFebruary 2025
VEC-Sim: A simulation platform for evaluating service caching and computation offloading policies in Vehicular Edge Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110985AbstractComputer simulation platforms offer an alternative solution by emulating complex systems in a controlled manner. However, existing Edge Computing (EC) simulators, as well as general-purpose vehicular network simulators, are not tailored for VEC ...
Highlights- Vehicular edge network modeling establish foundation for simulator design
- Modular architecture and rich APIs enable flexible simulator customization
- Realistic-enhanced mechanisms replicate heterogeneous access patterns
- In-depth ...
- articleFebruary 2025
A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directions
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110984AbstractEncrypted traffic detection and classification is a critical domain in network security, increasingly essential in an era of pervasive encryption. This survey paper delves into integrating advanced Machine Learning (ML) and Deep Learning (DL) ...
Highlights- Taxonomy of Encrypted Traffic Detection and Classification Models.
- Survey of Techniques for Encrypted Traffic Detection and Classification.
- Comprehensive Analysis of Datasets.
- Overview of Technical Analyzers/Information ...
- research-articleFebruary 2025
Freshness aware vehicular crowdsensing with multi-agent reinforcement learning
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110978AbstractVehicular crowdsensing leverages the mobility and sensing capabilities of vehicles to provide efficient data collection and monitoring services for urban areas. However, maintaining data freshness in urban sensing environments while addressing ...
- research-articleFebruary 2025
EAPT: An encrypted traffic classification model via adversarial pre-trained transformers
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110973AbstractEncrypted traffic classification plays a critical role in network traffic management and optimization, as it helps identify and differentiate between various types of traffic, thereby enhancing the quality and efficiency of network services. ...
- articleFebruary 2025
Physically-consistent EM models-aware RIS-aided communication — A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110963AbstractThe rapid development of reconfigurable intelligent surfaces (RISs) has sparked transformative advancements in wireless communication systems. These intelligent metasurfaces, adept at dynamically manipulating electromagnetic (EM) waves, hold vast ...
- research-articleFebruary 2025
STAR-RIS-aided NOMA communication for mobile edge computing using hybrid deep reinforcement learning
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110960AbstractReconfigurable intelligent surface (RIS) is expected to be able to significantly reduce task processing delay and energy consumptions of mobile users (MUs) in mobile edge computing (MEC) by intelligently adjusting its reflecting elements’ phase-...
- research-articleFebruary 2025
An effective scheme for classifying imbalanced traffic in SD-IoT, leveraging XGBoost and active learning
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110939AbstractThe volume and diversity of Internet traffic are constantly growing due to the simplicity of Internet of Things (IoT) technology, making machine learning-powered solutions increasingly essential for efficient network oversight in the future. The ...
Highlights- We proposed the cost sensitive XGBoost algorithm for multi-class classification.
- To overcome the minority class data an active learning framework is implemented.
- we employed the uncertainty sampling technique to decrease the ...
- research-articleFebruary 2025
DUdetector: A dual-granularity unsupervised model for network anomaly detection
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110937AbstractInternet of Things (IoT) devices are often used as springboards for network intrusion due to the open nature of IoT protocol stacks that enable automatic inter-connection and data sharing among devices, so it is critical to develop network ...
- research-articleFebruary 2025
SFACIF: A safety function attack and anomaly industrial condition identified framework
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110927AbstractHigh-stakes process industries require a harmonious relationship between the Safety Instrumented System (SIS) and the Basic Process Control System (BPCS) to guarantee the safety and stability of operations. As security threats to SIS intensify, ...
Highlights- Propose SFACIF to identify safety function attacks and anomaly industrial conditions.
- Propose a coding scheme to differentiate safety function attack from industrial anomalies.
- Propose a modified SWRSM to address the higher fault ...
- research-articleFebruary 2025
BGP anomaly detection as a group dynamics problem
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 257, Issue Chttps://doi.org/10.1016/j.comnet.2024.110926AbstractUnderstanding group information and collective behaviors is an ongoing area of research, encompassing natural phenomena and human dynamics. Quantifying interactions and interdependencies at the group level can be valuable for understanding ...
Highlights- Investigation of multiple Autonomous Systems (ASes) in terms of group information and dynamics for the purposes of group-AS level BGP anomaly detection.
- The first time Multidimensional Recurrence Quantification Analysis (MdRQA) has ...