Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks

This paper investigates the multi-Unmanned Aerial Vehicle (UAV)-assisted wireless-powered Mobile Edge Computing (MEC) system, where UAVs provide computation and powering services to mobile terminals....

Share article

Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture

The deployment of distributed multi-controllers for Software-Defined Networking (SDN) architecture is an emerging solution to improve network scalability and management. However, the network control...

Share article

High-throughput SatCom-on-the-move antennas: technical overview and state-of-the-art

With the rapid development of satellite communications, satellite antennas attract growing interest, especially the high-throughput SatCom-on-the-move antenna for providing high-speed connectivity in...

Share article

Collaborative non-chain DNN inference with multi-device based on layer parallel

Various intelligent applications based on non-chain DNN models are widely used in Internet of Things (IoT) scenarios. However, resource-constrained IoT devices usually cannot afford the heavy computation...

Share article

DAG-based swarm learning: a secure asynchronous learning framework for Internet of Vehicles

To provide diversified services in the intelligent transportation systems, smart vehicles will generate unprecedented amounts of data every day. Due to data security and user privacy issues, Federated...

Share article

Entropy-based redundancy analysis and information screening

The ongoing data explosion introduced unprecedented challenges to the information security of communication networks. As images are one of the most commonly used information transmission carriers; therefore,...

Share article

On the design of an AI-driven secure communication scheme for internet of medical things environment

The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, that facilitate the connection of healthcare information...

Share article

Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches

The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS, SLAMSA, (p, k)-Angelization,...

Share article

Request pattern change-based cache pollution attack detection and defense in edge computing

Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However,...

Share article

Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits. It has been common since 2017, and...

Share article

Multiplex network infomax: Multiplex network embedding via information fusion

For networking of big data applications, an essential issue is how to represent networks in vector space for further mining and analysis tasks, e.g., node classification, clustering, link prediction,...

Share article

Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes

The error correction performance of Belief Propagation (BP) decoding for polar codes is satisfactory compared with the Successive Cancellation (SC) decoding. Nevertheless, it has to complete a fixed...

Share article

A malware propagation prediction model based on representation learning and graph convolutional networks

The traditional malware research is mainly based on its recognition and detection as a breakthrough point, without focusing on its propagation trends or predicting the subsequently infected nodes. The...

Share article

A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems

With the rise of the Internet of Vehicles (IoV) and the number of connected vehicles increasing on the roads, Cooperative Intelligent Transportation Systems (C-ITSs) have become an important area of...

Share article

Stochastic programming based multi-arm bandit offloading strategy for internet of things

In order to solve the high latency of traditional cloud computing and the processing capacity limitation of Internet of Things (IoT) users, Multi-access Edge Computing (MEC) migrates computing and storage...

Share article

A measurable refinement method of design and verification for micro-kernel operating systems in communication network

A secure operating system in the communication network can provide the stable working environment, which ensures that the user information is not stolen. The micro-kernel operating system in the communication...

Share article

Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective

The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures. To deal with this problem, communication networks consider fog computing...

Share article

On fine-grained visual explanation in convolutional neural networks

Existing explanation methods for Convolutional Neural Networks (CNNs) lack the pixel-level visualization explanations to generate the reliable fine-grained decision features. Since there are inconsistencies...

Share article

Accurate threat hunting in industrial internet of things edge devices

Industrial Internet of Things (IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection, transmission, storage, and processing. Any kind...

Share article

Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting

Accurate forecasting for photovoltaic power generation is one of the key enablers for the integration of solar photovoltaic systems into power grids. Existing deep-learning-based methods can perform...

Share article

Optimal social welfare: A many-to-many data transaction mechanism based on double auctions

With the development of Big Data and the Internet of Things (IoT), the data value is more significant in both academia and industry. Trading can achieve maximal data value and prepare data for smart...

Share article

A dynamic and resource sharing virtual network mapping algorithm

Network virtualization can effectively establish dedicated virtual networks to implement various network functions. However, the existing research works have some shortcomings, for example, although...

Share article

A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs

The proliferation of Internet of Things (IoT) rapidly increases the possiblities of Simple Service Discovery Protocol (SSDP) reflection attacks. Most DDoS attack defence strategies deploy only to a...

Share article

On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems

The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale Internet of Things (IoT) systems. Traditional blockchain-based source tracing applications...

Share article

Green resource allocation for mobile edge computing

We investigate the green resource allocation to minimize the energy consumption of the users in mobile edge computing systems, where task offloading decisions, transmit power, and computation resource...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.