Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks

Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status. However, the presentation of the data lacks structural information....

Share article

Computation and wireless resource management in 6G space-integrated-ground access networks

In 6th Generation Mobile Networks (6G), the Space-Integrated-Ground (SIG) Radio Access Network (RAN) promises seamless coverage and exceptionally high Quality of Service (QoS) for diverse services....

Share article

Toward zero trust in 5G industrial internet collaboration systems

With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can...

Share article

Hierarchical detection and tracking for moving targets in underwater wireless sensor networks

It is difficult to improve both energy consumption and detection accuracy simultaneously, and even to obtain the trade-off between them, when detecting and tracking moving targets, especially for Underwater...

Share article

Cross-domain resources optimization for hybrid edge computing networks: federated DRL approach

Due to the dynamic nature of service requests and the uneven distribution of services in the Internet of Vehicles (IoV), Multi-access Edge Computing (MEC) networks with pre-installed servers are often...

Share article

C-privacy: a social relationship-driven image customization sharing method in cyber-physical networks

Cyber-Physical Networks(CPN) are comprehensive systems that integrate information and physical domains, and are widely used in various fields such as online social networking, smart grids, and the Internet...

Share article

Spatiotemporal correlation based self-adaptive pose estimation in complex scenes

In the current digital era, large-scale Artificial Intelligence (AI) models have fundamentally changed the landscape of the AI field. These models excel at extracting complex patterns and information...

Share article

A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation

The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses, which involve the calculation of complex functions, such as matrix operations....

Share article

Blockchain and signcryption enabled asynchronous federated learning framework in fog computing

Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies...

Share article

TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy

With the popularity of the Internet of Vehicles (IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers...

Share article

Joint resource allocation and beamforming design for RIS-aided symbiotic radio networks: A DRL approach

In this paper, we investigate a Reconfigurable Intelligent Surface (RIS)-assisted secure Symbiosis Radio (SR) network to address the information leakage of the primary transmitter (PTx) to potential...

Share article

A novel routing method for dynamic control in distributed computing power networks

Driven by diverse intelligent applications, computing capability is moving from the central cloud to the edge of the network in the form of small cloud nodes, forming a distributed computing power network....

Share article

Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections

With the support of Vehicle-to-Everything (V2X) technology and computing power networks, the existing intersection traffic order is expected to benefit from efficiency improvements and energy savings...

Share article

Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives

The Intelligent Internet of Things (IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent...

Share article

Overview of RIS-enabled secure transmission in 6G wireless networks

As the 6th-Generation (6G) wireless communication networks evolve, privacy concerns are expected due to the transmission of vast amounts of security-sensitive private information. In this context, a...

Share article

Deep learning for joint channel estimation and feedback in massive MIMO systems

The great potentials of massive Multiple-Input Multiple-Output (MIMO) in Frequency Division Duplex (FDD) mode can be fully exploited when the downlink Channel State Information (CSI) is available at...

Share article

IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic

A network intrusion detection system is critical for cyber security against illegitimate attacks. In terms of feature perspectives, network traffic may include a variety of elements such as attack reference,...

Share article

Doped low-density parity-check codes

In this paper, we propose a doping approach to lower the error floor of Low-Density Parity-Check (LDPC) codes. The doping component is a short block code in which the information bits are selected from...

Share article

An intelligent active probing and trace-back scheme for IoT anomaly detection

Due to their simple hardware, sensor nodes in IoT are vulnerable to attack, leading to data routing blockages or malicious tampering, which significantly disrupts secure data collection. An Intelligent...

Share article

Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks

Unbalanced traffic distribution in cellular networks results in congestion and degrades spectrum efficiency. To tackle this problem, we propose an Unmanned Aerial Vehicle (UAV)-assisted wireless network...

Share article

IoV environment exploring coordination: A federated learning approach

Exploring open fields with coordinated unmanned vehicles is popular in academia and industries. One of the most impressive applicable approaches is the Internet of Vehicles (IoV). The IoV connects vehicles,...

Share article

Optimization of resource allocation in FDD massive MIMO systems

The performance of massive MIMO systems relies heavily on the availability of Channel State Information at the Transmitter (CSIT). A large amount of work has been devoted to reducing the CSIT acquisition...

Share article

Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks

In this paper, we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle (UAV)-enabled communication in Device-to-Device (D2D) networks. Our objective is to maximize...

Share article

Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks

Unmanned Aerial Vehicles (UAVs) as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in B5G. Besides, dynamic resource allocation and...

Share article

Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications

Beyond-5G (B5G) aims to meet the growing demands of mobile traffic and expand the communication space. Considering that intelligent applications to B5G wireless communications will involve security...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.