Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks
Available online 21 May 2022
In this paper, we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle (UAV)-enabled communication in Device-to-Device (D2D) networks. Our objective is to maximize...
Share article
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
Available online 21 May 2022
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm...
Share article
Design and analysis of intrusion detection systems for wireless mesh networks
Available online 21 May 2022
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy...
Share article
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications
Available online 18 May 2022
B5G aims to meet the demands of today's growing mobile traffic and expand the communication space. Considering that the intelligent application to B5G wireless communications will involve the security...
Share article
A secure visual framework for multi-index protection evaluation in networks
Available online 18 May 2022
Mining the core value of Industrial Internet of Things (IIoT) data safely and reducing the risk of malicious attacks are the inherent requirements of industrial data visualization. Visualization technology...
Share article
Prototyping low-cost automatic weather stations for natural disaster monitoring
Available online 17 May 2022
Weather events put human lives at risk mostly when people might occupy areas susceptible to natural disasters. Deploying Professional Weather Stations (PWS) in vulnerable areas is key for monitoring...
Share article
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network
Available online 16 May 2022
The high bandwidth and low latency of 6G network technology enable the successful application of monocular 3D object detection on vehicle platforms. Monocular 3D-object-detection-based Pseudo-LiDAR...
Share article
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions
Available online 16 May 2022
With the development of Big Data and the Internet of Things (IoT), the data value is more significant in both academia and industry. Trading can achieve maximal data value and prepare data for smart...
Share article
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
Available online 14 May 2022
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive volumes of data explosion. The generated data is collected and shared using edge-based IoT structures at a...
Share article
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system
Available online 14 May 2022
In order to reduce the physical impairment caused by signal distortion, in this paper, we investigate symbol detection with Deep Learning (DL) methods to improve bit-error performance in the optical...
Share article
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing
Available online 14 May 2022
The Autonomous Underwater Glider (AUG) is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications, in which path planning is an essential...
Share article
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection
Available online 13 May 2022
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits. It has been common since 2017, and...
Share article
A WKNN-based approach for NB-IoT sensors localization
Available online 13 May 2022
With the recent introduction of NarrowBand Internet of Things (NB-IoT) technology in the 4th and 5th generations of mobile radio networks, the mobile communications context opens up significantly to...
Share article
A blockchain-based audit approach for encrypted data in federated learning
Available online 13 May 2022
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated...
Share article
A novel proactive soft load balancing framework for ultra dense network
Available online 7 May 2022
A major challenge for the future wireless network is to design the self-organizing architecture. The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing...
Share article
Edge robotics: are we ready? An experimental evaluation of current vision and future directions
Available online 6 May 2022
Cloud-based robotics systems leverage a wide range of Information Technologies (IT) to offer tangible benefits like cost reduction, powerful computational capabilities, data offloading, etc. However,...
Share article
Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud
Available online 6 May 2022
Deploying service nodes hierarchically at the edge of the network can effectively improve the service quality of offloaded task requests and increase the utilization of resources. In this paper, we...
Share article
Smart object recommendation based on topic learning and joint features in the social internet of things
Available online 6 May 2022
With the extensive integration of the Internet, social networks and the internet of things, the social Internet of things has increasingly become a significant research issue. In the social internet...
Share article
A survey on blockchain-based integrity auditing for cloud data
Available online 5 May 2022
With the rapid advancement of cloud computing, cloud storage services have developed rapidly. One issue that has attracted particular attention in such remote storage services is that cloud storage...
Share article
A robust symbol timing strategy for cellular systems
Available online 5 May 2022
In cellular systems, establishing the initial symbol timing of potential preambles is the first step of a cell search. The envelope fluctuation of the downlink signal hinders the successful timing of...
Share article
Nonbinary ldpc-coded probabilistic shaping scheme for MIMO systems based on signal space diversity
Available online 5 May 2022
This paper first describes a binary Low-Density Parity-Check (LDPC)-coded Probabilistic Shaping (PS) scheme for Multiple-Input Multiple-Output (MIMO) systems based on Signal Space Diversity (SSD). Second,...
Share article
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder
Available online 5 May 2022
The attacks on in-vehicle Controller Area Network (CAN) bus messages severely disrupt normal communication between vehicles. Therefore, researches on intrusion detection models for CAN have positive...
Share article
FedCDR: Privacy-preserving federated cross-domain recommendation
Available online 5 May 2022
Cross-domain recommendation (CDR) aims to solve data sparsity and cold start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse...
Share article
Anti-jamming channel access in 5G ultra-dense networks: A game-theoretic learning approach
Available online 5 May 2022
This paper investigates the Quality of Experience (QoE) oriented channel access anti-jamming problem in 5th Generation Mobile Communication (5G) ultra-dense networks. Firstly, considering that the 5G...
Share article
Soft transmission of 3D video for low power and low complexity scenario
Available online 5 May 2022
Thanks to the rapid development of naked-eye 3D and wireless communication technology, 3D video related applications on mobile devices have attracted a lot of attention. Nevertheless, the time-varying...
Share article