Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks
Available online 29 November 2023
This paper investigates the multi-Unmanned Aerial Vehicle (UAV)-assisted wireless-powered Mobile Edge Computing (MEC) system, where UAVs provide computation and powering services to mobile terminals....
Share article
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
Available online 23 November 2023
The deployment of distributed multi-controllers for Software-Defined Networking (SDN) architecture is an emerging solution to improve network scalability and management. However, the network control...
Share article
High-throughput SatCom-on-the-move antennas: technical overview and state-of-the-art
Available online 17 November 2023
With the rapid development of satellite communications, satellite antennas attract growing interest, especially the high-throughput SatCom-on-the-move antenna for providing high-speed connectivity in...
Share article
Collaborative non-chain DNN inference with multi-device based on layer parallel
Available online 17 November 2023
Various intelligent applications based on non-chain DNN models are widely used in Internet of Things (IoT) scenarios. However, resource-constrained IoT devices usually cannot afford the heavy computation...
Share article
DAG-based swarm learning: a secure asynchronous learning framework for Internet of Vehicles
Available online 10 November 2023
To provide diversified services in the intelligent transportation systems, smart vehicles will generate unprecedented amounts of data every day. Due to data security and user privacy issues, Federated...
Share article
Entropy-based redundancy analysis and information screening
October 2023
The ongoing data explosion introduced unprecedented challenges to the information security of communication networks. As images are one of the most commonly used information transmission carriers; therefore,...
Share article
On the design of an AI-driven secure communication scheme for internet of medical things environment
October 2023
The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, that facilitate the connection of healthcare information...
Share article
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
October 2023
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS, SLAMSA, (p, k)-Angelization,...
Share article
Request pattern change-based cache pollution attack detection and defense in edge computing
October 2023
Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network. However,...
Share article
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection
October 2023
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits. It has been common since 2017, and...
Share article
Multiplex network infomax: Multiplex network embedding via information fusion
October 2023
For networking of big data applications, an essential issue is how to represent networks in vector space for further mining and analysis tasks, e.g., node classification, clustering, link prediction,...
Share article
Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes
October 2023
The error correction performance of Belief Propagation (BP) decoding for polar codes is satisfactory compared with the Successive Cancellation (SC) decoding. Nevertheless, it has to complete a fixed...
Share article
A malware propagation prediction model based on representation learning and graph convolutional networks
October 2023
The traditional malware research is mainly based on its recognition and detection as a breakthrough point, without focusing on its propagation trends or predicting the subsequently infected nodes. The...
Share article
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems
October 2023
With the rise of the Internet of Vehicles (IoV) and the number of connected vehicles increasing on the roads, Cooperative Intelligent Transportation Systems (C-ITSs) have become an important area of...
Share article
Stochastic programming based multi-arm bandit offloading strategy for internet of things
October 2023
In order to solve the high latency of traditional cloud computing and the processing capacity limitation of Internet of Things (IoT) users, Multi-access Edge Computing (MEC) migrates computing and storage...
Share article
A measurable refinement method of design and verification for micro-kernel operating systems in communication network
October 2023
A secure operating system in the communication network can provide the stable working environment, which ensures that the user information is not stolen. The micro-kernel operating system in the communication...
Share article
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective
October 2023
The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures. To deal with this problem, communication networks consider fog computing...
Share article
On fine-grained visual explanation in convolutional neural networks
October 2023
Existing explanation methods for Convolutional Neural Networks (CNNs) lack the pixel-level visualization explanations to generate the reliable fine-grained decision features. Since there are inconsistencies...
Share article
Accurate threat hunting in industrial internet of things edge devices
October 2023
Industrial Internet of Things (IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection, transmission, storage, and processing. Any kind...
Share article
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting
October 2023
Accurate forecasting for photovoltaic power generation is one of the key enablers for the integration of solar photovoltaic systems into power grids. Existing deep-learning-based methods can perform...
Share article
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions
October 2023
With the development of Big Data and the Internet of Things (IoT), the data value is more significant in both academia and industry. Trading can achieve maximal data value and prepare data for smart...
Share article
A dynamic and resource sharing virtual network mapping algorithm
October 2023
Network virtualization can effectively establish dedicated virtual networks to implement various network functions. However, the existing research works have some shortcomings, for example, although...
Share article
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs
October 2023
The proliferation of Internet of Things (IoT) rapidly increases the possiblities of Simple Service Discovery Protocol (SSDP) reflection attacks. Most DDoS attack defence strategies deploy only to a...
Share article
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
October 2023
The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale Internet of Things (IoT) systems. Traditional blockchain-based source tracing applications...
Share article
Green resource allocation for mobile edge computing
October 2023
We investigate the green resource allocation to minimize the energy consumption of the users in mobile edge computing systems, where task offloading decisions, transmit power, and computation resource...
Share article