A systematic literature review of blockchain cyber security
May 2020
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through...
Share article
Visible light communication: Applications, architecture, standardization and research challenges
May 2017
The Radio Frequency (RF) communication suffers from interference and high latency issues. Along with this, RF communication requires a separate setup for transmission and reception of RF waves. Overcoming...
Share article
A survey on deploying mobile deep learning applications: A systemic and technical perspective
February 2022
With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service...
Share article
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks
April 2022
In this paper, we survey state-of-the-art research outcomes in the burgeoning field of Reconfigurable Intelligent Surface (RIS), given its potential for significant performance enhancement of next-generation...
Share article
Machine learning for internet of things data analysis: a survey
August 2018
Rapid developments in hardware, software, and communication technologies have facilitated the emergence of Internet-connected sensory devices that provide observations and data measurements from the...
Share article
Machine learning-based zero-touch network and service management: a survey
April 2022
The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures. Consequently, the arrival of multiple management solutions to cope...
Share article
Security and privacy in 6G networks: New areas and new challenges
August 2020
With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions....
Share article
Performance analysis and comparison of PoW, PoS and DAG based blockchains
November 2020
In the blockchain, the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks. Various blockchain consensus mechanisms have been proposed....
Share article
Attacks and defences on intelligent connected vehicles: a survey
November 2020
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g.,...
Share article
Help from space: grant-free massive access for satellite-based IoT in the 6G era
April 2022
The Sixth-Generation (6G) standard for wireless communications is expected to realize ubiquitous coverage for massive Internet of Things (IoT) networks by 2030. Satellite-based communications are recognized...
Share article
Privacy preservation in permissionless blockchain: A survey
August 2021
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain...
Share article
A survey on deep learning for textual emotion analysis in social networks
Available online 14 October 2021
Textual Emotion Analysis (TEA) aims to extract and analyze user emotional states in texts. Various Deep Learning (DL) methods have developed rapidly, and they have proven to be successful in many fields...
Share article
Dynamic defenses in cyber security: Techniques, methods and challenges
Available online 29 July 2021
Driven by the rapid development of the Internet of Things, cloud computing and other emerging technologies, the connotation of cyberspace is constantly expanding and becoming the fifth dimension of...
Share article
Tracing manufacturing processes using blockchain-based token compositions
May 2020
Supply chain traceability is one of the most promising use cases to benefit from characteristics of blockchain, such as decentralization, immutability and transparency, not required to build prior trust...
Share article
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects
April 2022
Over the past years, the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life. However, using machine learning...
Share article
Optimal chunk caching in network coding-based qualitative communication
February 2022
Network processing in the current Internet is at the entirety of the data packet, which is problematic when encountering network congestion. The newly proposed Internet service named Qualitative Communication...
Share article
Edge computing technologies for Internet of Things: a primer
April 2018
With the rapid development of mobile internet and Internet of Things applications, the conventional centralized cloud computing is encountering severe challenges, such as high latency, low Spectral...
Share article
Wireless sensing for a solar power system
February 2020
Wireless sensing is an excellent approach for remotely operated solar power system. Not only being able to get the sensor data, such as voltage, current, and temperature, the system can also have a...
Share article
A survey of edge computing-based designs for IoT security
May 2020
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications...
Share article
A survey on user-centric cell-free massive MIMO systems
Available online 30 December 2021
The mobile data traffic has been exponentially growing during the last decades. This was enabled by the densification of the network infrastructure in terms of increased cell density (i.e., Ultra-Dense...
Share article
A blockchain future for internet of things security: a position paper
August 2018
Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things,...
Share article
A review of optimization methods for computation offloading in edge computing networks
Available online 16 March 2022
Handling the massive amount of data generated by Smart Mobile Devices (SMDs) is a challenging computational problem. Edge Computing is an emerging computation paradigm that is employed to conquer this...
Share article
A new type of blockchain for secure message exchange in VANET
May 2020
In the Vehicular Ad-hoc NETworks (VANET), the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance. However, traditional VANETs face several...
Share article
A roadmap for security challenges in the Internet of Things
April 2018
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent...
Share article
Machine learning in vehicular networking: An overview
February 2022
As vehicle complexity and road congestion increase, combined with the emergence of electric vehicles, the need for intelligent transportation systems to improve on-road safety and transportation efficiency...
Share article