Recent Articles

Open access

ISSN: 2352-8648

Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks

Heterogeneous Networks (HetNets) and cell densification represent promising solutions for the surging data traffic demand in wireless networks. In dense HetNets, user traffic is steered toward the Low-Power...

Share article

A survey on deep learning for textual emotion analysis in social networks

Textual Emotion Analysis (TEA) aims to extract and analyze user emotional states in texts. There has been rapid development of various Deep Learning (DL) methods that have proven successful in many...

Share article

Survey on recent advances in IoT application layer protocols and machine learning scope for research directions

The Internet of Things (IoT) has been growing over the past few years due to its flexibility and ease of use in real-time applications. The IoT’s foremost task is ensuring that there is proper communication...

Share article

On-chain is not Enough: Ensuring Pre-data on the chain Credibility for Blockchain-based Source-tracing Systems

Blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale Internet of Things (IoT) systems. Traditional blockchain-based source tracing applications...

Share article

Toward intelligent wireless communications: Deep learning − based physical layer technologies

Advanced technologies are required in future mobile wireless networks to support services with highly diverse requirements in terms of high data rate and reliability, low latency, and massive access....

Share article

Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks

Device-to-Device (D2D) communication-enabled Heterogeneous Cellular Networks (HCNs) have been a promising technology for satisfying the growing demands of smart mobile devices in fifth-generation mobile...

Share article

Multi-objective optimization for task offloading based on network calculus in fog environments

With the widespread application of wireless communication technology and continuous improvements to Internet of Things (IoT) technology, fog computing architecture composed of edge, fog, and cloud layers...

Share article

EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks

Cloud datacenters have become overwhelmed with data-intensive applications due to the limited computational capabilities of mobile terminals. Mobile edge computing is emerging as a potential paradigm...

Share article

Attention-based spatio-temporal graph convolutional network considering external factors for multistep traffic flow prediction

Traffic flow prediction is an important part of the intelligent transportation system. Accurate multistep traffic flow prediction plays an important role in improving the operational efficiency of the...

Share article

Using Dummy Data for RFID Tag and Reader Authentication

Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy...

Share article

A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing

Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks (VANETs). Previous researchers used either cryptography, trust scores,...

Share article

Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths

Privacy protection is the key to maintaining Internet of Things communication strategy. Steganography is an important way to achieve covert communication that protects user data privacy. Steganalysis...

Share article

Length matters: scalable fast encrypted Internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning

As an essential function of encrypted Internet traffic analysis, encrypted traffic service classification can support both coarse-grained network service traffic management and security supervision....

Share article

A Classification-based Privacy-Preserving Decision-Making for Secure Data Sharing in Internet of Things Assisted Applications

The introduction of the Internet of Things (IoT) paradigm serves as pervasive resource access and sharing platform for different real-time applications. Decentralized resource availability, access,...

Share article

Huge DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network

The Global Positioning System (GPS) has become a foundation for most location-based services and navigation systems, such as autonomous vehicles, drones, ships, and wearable devices. However, it is...

Share article

Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things

In Wireless Multimedia Sensor Networks (WMSNs), nodes capable of retrieving video, audio, images, and small scale sensor data, tend to generate immense traffic of various types. The energy-efficient...

Share article

RFID-based 3D human pose tracking: A subject generalization approach

Three-dimensional (3D) human pose tracking has recently attracted increased attention in the computer vision field. Real-time pose tracking is highly useful in various domains such as video surveillance,...

Share article

Machine learning-based zero-touch network and service management: A survey

The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures. Consequently, the arrival of multiple management solutions to cope...

Share article

Blockchain-based data transmission control for Tactical Data Link

Tactical Data Link (TDL) is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant, automatic, and secure way. So far, TDL...

Share article

Towards asynchronous federated learning for heterogeneous edge-powered internet of things

The advancement of the Internet of Things (IoT) brings new opportunities for collecting real-time data and deploying machine learning models. Nonetheless, an individual IoT device may not have adequate...

Share article

UTM: A trajectory privacy evaluating model for online health monitoring

A huge amount of sensitive personal data is being collected by various online health monitoring applications. Although the data is anonymous, the personal trajectories (e.g., the chronological access...

Share article

Green indoor optical wireless communication systems: Pathway towards pervasive deployment

The Optical Wireless Communication (OWC) offers the high capacity of optical fiber communication with the flexibility of wireless communication. Since it works in the optical region of the ElectroMagnetic...

Share article

Fooling intrusion detection systems using adversarially autoencoder

Due to the increasing cyber-attacks, various Intrusion Detection Systems (IDSs) have been proposed to identify network anomalies. Most existing machine learning-based IDSs learn patterns from the features...

Share article

A blockchain-empowered AAA scheme in the large-scale HetNet

A Large-Scale Heterogeneous Network (LS-HetNet) integrates different networks into one uniform network system to provide seamless one-world network coverage. In LS-HetNet, various devices use different...

Share article

Unintentional forking analysis in wireless blockchain networks

The forking problem plays a key role in the security issue, which is a major concern in the blockchain system. Although many works studied the attack strategy, consensus mechanism, privacy-protecting...

Share article

Stay informed

Register your interest and receive email alerts tailored to your needs. Sign up below.