Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
Available online 16 April 2024
Changes in the Atmospheric Electric Field Signal (AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous...
Share article
A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks
Available online 15 April 2024
Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status. However, the presentation of the data lacks structural information....
Share article
Computation and wireless resource management in 6G space-integrated-ground access networks
Available online 5 April 2024
In 6th Generation Mobile Networks (6G), the Space-Integrated-Ground (SIG) Radio Access Network (RAN) promises seamless coverage and exceptionally high Quality of Service (QoS) for diverse services....
Share article
Toward zero trust in 5G industrial internet collaboration systems
Available online 29 March 2024
With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can...
Share article
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks
Available online 27 March 2024
It is difficult to improve both energy consumption and detection accuracy simultaneously, and even to obtain the trade-off between them, when detecting and tracking moving targets, especially for Underwater...
Share article
Cross-domain resources optimization for hybrid edge computing networks: federated DRL approach
Available online 26 March 2024
Due to the dynamic nature of service requests and the uneven distribution of services in the Internet of Vehicles (IoV), Multi-access Edge Computing (MEC) networks with pre-installed servers are often...
Share article
C-privacy: a social relationship-driven image customization sharing method in cyber-physical networks
Available online 25 March 2024
Cyber-Physical Networks(CPN) are comprehensive systems that integrate information and physical domains, and are widely used in various fields such as online social networking, smart grids, and the Internet...
Share article
Spatiotemporal correlation based self-adaptive pose estimation in complex scenes
Available online 20 March 2024
In the current digital era, large-scale Artificial Intelligence (AI) models have fundamentally changed the landscape of the AI field. These models excel at extracting complex patterns and information...
Share article
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
Available online 16 March 2024
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses, which involve the calculation of complex functions, such as matrix operations....
Share article
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
Available online 15 March 2024
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies...
Share article
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
Available online 15 March 2024
With the popularity of the Internet of Vehicles (IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers...
Share article
Joint resource allocation and beamforming design for RIS-aided symbiotic radio networks: A DRL approach
Available online 13 March 2024
In this paper, we investigate a Reconfigurable Intelligent Surface (RIS)-assisted secure Symbiosis Radio (SR) network to address the information leakage of the primary transmitter (PTx) to potential...
Share article
A novel routing method for dynamic control in distributed computing power networks
Available online 13 March 2024
Driven by diverse intelligent applications, computing capability is moving from the central cloud to the edge of the network in the form of small cloud nodes, forming a distributed computing power network....
Share article
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections
Available online 7 March 2024
With the support of Vehicle-to-Everything (V2X) technology and computing power networks, the existing intersection traffic order is expected to benefit from efficiency improvements and energy savings...
Share article
Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives
Available online 6 March 2024
The Intelligent Internet of Things (IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent...
Share article
Overview of RIS-enabled secure transmission in 6G wireless networks
Available online 5 March 2024
As the 6th-Generation (6G) wireless communication networks evolve, privacy concerns are expected due to the transmission of vast amounts of security-sensitive private information. In this context, a...
Share article
Deep learning for joint channel estimation and feedback in massive MIMO systems
February 2024
The great potentials of massive Multiple-Input Multiple-Output (MIMO) in Frequency Division Duplex (FDD) mode can be fully exploited when the downlink Channel State Information (CSI) is available at...
Share article
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
February 2024
A network intrusion detection system is critical for cyber security against illegitimate attacks. In terms of feature perspectives, network traffic may include a variety of elements such as attack reference,...
Share article
Doped low-density parity-check codes
February 2024
In this paper, we propose a doping approach to lower the error floor of Low-Density Parity-Check (LDPC) codes. The doping component is a short block code in which the information bits are selected from...
Share article
An intelligent active probing and trace-back scheme for IoT anomaly detection
February 2024
Due to their simple hardware, sensor nodes in IoT are vulnerable to attack, leading to data routing blockages or malicious tampering, which significantly disrupts secure data collection. An Intelligent...
Share article
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks
February 2024
Unbalanced traffic distribution in cellular networks results in congestion and degrades spectrum efficiency. To tackle this problem, we propose an Unmanned Aerial Vehicle (UAV)-assisted wireless network...
Share article
IoV environment exploring coordination: A federated learning approach
February 2024
Exploring open fields with coordinated unmanned vehicles is popular in academia and industries. One of the most impressive applicable approaches is the Internet of Vehicles (IoV). The IoV connects vehicles,...
Share article
Optimization of resource allocation in FDD massive MIMO systems
February 2024
The performance of massive MIMO systems relies heavily on the availability of Channel State Information at the Transmitter (CSIT). A large amount of work has been devoted to reducing the CSIT acquisition...
Share article
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks
February 2024
In this paper, we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle (UAV)-enabled communication in Device-to-Device (D2D) networks. Our objective is to maximize...
Share article
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks
February 2024
Unmanned Aerial Vehicles (UAVs) as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in B5G. Besides, dynamic resource allocation and...
Share article