Recent Articles

Open access

ISSN: 2352-8648

Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks

In this paper, we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle (UAV)-enabled communication in Device-to-Device (D2D) networks. Our objective is to maximize...

Share article

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT

Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm...

Share article

Design and analysis of intrusion detection systems for wireless mesh networks

Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy...

Share article

Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications

B5G aims to meet the demands of today's growing mobile traffic and expand the communication space. Considering that the intelligent application to B5G wireless communications will involve the security...

Share article

A secure visual framework for multi-index protection evaluation in networks

Mining the core value of Industrial Internet of Things (IIoT) data safely and reducing the risk of malicious attacks are the inherent requirements of industrial data visualization. Visualization technology...

Share article

Prototyping low-cost automatic weather stations for natural disaster monitoring

Weather events put human lives at risk mostly when people might occupy areas susceptible to natural disasters. Deploying Professional Weather Stations (PWS) in vulnerable areas is key for monitoring...

Share article

Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network

The high bandwidth and low latency of 6G network technology enable the successful application of monocular 3D object detection on vehicle platforms. Monocular 3D-object-detection-based Pseudo-LiDAR...

Share article

Optimal social welfare: A many-to-many data transaction mechanism based on double auctions

With the development of Big Data and the Internet of Things (IoT), the data value is more significant in both academia and industry. Trading can achieve maximal data value and prepare data for smart...

Share article

Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive volumes of data explosion. The generated data is collected and shared using edge-based IoT structures at a...

Share article

Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system

In order to reduce the physical impairment caused by signal distortion, in this paper, we investigate symbol detection with Deep Learning (DL) methods to improve bit-error performance in the optical...

Share article

A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing

The Autonomous Underwater Glider (AUG) is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications, in which path planning is an essential...

Share article

Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits. It has been common since 2017, and...

Share article

A WKNN-based approach for NB-IoT sensors localization

With the recent introduction of NarrowBand Internet of Things (NB-IoT) technology in the 4th and 5th generations of mobile radio networks, the mobile communications context opens up significantly to...

Share article

A blockchain-based audit approach for encrypted data in federated learning

The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated...

Share article

A novel proactive soft load balancing framework for ultra dense network

A major challenge for the future wireless network is to design the self-organizing architecture. The reactive self-organizing model of traditional networks needs to be transformed into an active self-organizing...

Share article

Edge robotics: are we ready? An experimental evaluation of current vision and future directions

Cloud-based robotics systems leverage a wide range of Information Technologies (IT) to offer tangible benefits like cost reduction, powerful computational capabilities, data offloading, etc. However,...

Share article

Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud

Deploying service nodes hierarchically at the edge of the network can effectively improve the service quality of offloaded task requests and increase the utilization of resources. In this paper, we...

Share article

Smart object recommendation based on topic learning and joint features in the social internet of things

With the extensive integration of the Internet, social networks and the internet of things, the social Internet of things has increasingly become a significant research issue. In the social internet...

Share article

A survey on blockchain-based integrity auditing for cloud data

With the rapid advancement of cloud computing, cloud storage services have developed rapidly. One issue that has attracted particular attention in such remote storage services is that cloud storage...

Share article

A robust symbol timing strategy for cellular systems

In cellular systems, establishing the initial symbol timing of potential preambles is the first step of a cell search. The envelope fluctuation of the downlink signal hinders the successful timing of...

Share article

Nonbinary ldpc-coded probabilistic shaping scheme for MIMO systems based on signal space diversity

This paper first describes a binary Low-Density Parity-Check (LDPC)-coded Probabilistic Shaping (PS) scheme for Multiple-Input Multiple-Output (MIMO) systems based on Signal Space Diversity (SSD). Second,...

Share article

A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder

The attacks on in-vehicle Controller Area Network (CAN) bus messages severely disrupt normal communication between vehicles. Therefore, researches on intrusion detection models for CAN have positive...

Share article

FedCDR: Privacy-preserving federated cross-domain recommendation

Cross-domain recommendation (CDR) aims to solve data sparsity and cold start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse...

Share article

Anti-jamming channel access in 5G ultra-dense networks: A game-theoretic learning approach

This paper investigates the Quality of Experience (QoE) oriented channel access anti-jamming problem in 5th Generation Mobile Communication (5G) ultra-dense networks. Firstly, considering that the 5G...

Share article

Soft transmission of 3D video for low power and low complexity scenario

Thanks to the rapid development of naked-eye 3D and wireless communication technology, 3D video related applications on mobile devices have attracted a lot of attention. Nevertheless, the time-varying...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.