Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Secure cognitive health monitoring using a directed acyclic graph-based and AI-enhanced IoMT framework

Millions of people throughout the world struggle with mental health disorders, but the widespread stigma associated with these issues often prevents them from seeking treatment. We propose a novel strategy...

Share article

Towards privacy-preserving and efficient word vector learning for lightweight IoT devices

Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the...

Share article

A compatible carbon efficiency information service framework based on the industrial internet identification

Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth. If explainable and available carbon emission data can be accurately...

Share article

Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities

Unmanned Aerial Vehicles (UAVs) are gaining increasing attention in many fields, such as military, logistics, and hazardous site mapping. Utilizing UAVs to assist communications is one of the promising...

Share article

Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper

In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical...

Share article

Vehicle-oriented ridesharing package delivery in blockchain system

Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage. Most existing ridesharing systems operate the matching of ridesharing in a centralized...

Share article

Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach

Cooperative communication through energy harvested relays in Cognitive Internet of Things (CIoT) has been envisioned as a promising solution to support massive connectivity of Cognitive Radio (CR) based...

Share article

Scheduling optimization for UAV communication coverage using virtual force-based PSO model

When the ground communication base stations in the target area are severely destroyed, the deployment of Unmanned Aerial Vehicle (UAV) ad hoc networks can provide people with temporary communication...

Share article

Factors affecting forensic electric network frequency matching – A comprehensive study

The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification. It is known as the Electric Network...

Share article

XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning

Federated Learning (FL), a burgeoning technology, has received increasing attention due to its privacy protection capability. However, the base algorithm FedAvg is vulnerable when it suffers from so-called...

Share article

DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet

In recent years, the Industrial Internet and Industry 4.0 came into being. With the development of modern industrial intelligent manufacturing technology, digital twins, Web3 and many other digital...

Share article

Data-driven human and bot recognition from web activity logs based on hybrid learning techniques

Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability...

Share article

Downlink network-coded multiple access with diverse power

Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when...

Share article

A new adaptive co-site broadband interference cancellation method with auxiliary channel

With the boom of the communication systems on some independent platforms (such as satellites, space stations, airplanes, and vessels), co-site interference is becoming prominent. The adaptive interference...

Share article

Efficient signal detector design for OTFS with index modulation

In this paper, efficient signal detectors are designed for Orthogonal Time Frequency Space (OTFS) modulation with Index Modulation (IM) systems. Firstly, the Minimum Mean Squared Error (MMSE) based...

Share article

Position-aware packet loss optimization on service function chain placement

The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of...

Share article

A dynamic algorithm for trust inference based on double DQN in the internet of things

The development of the Internet of Things (IoT) has brought great convenience to people. However, some information security problems such as privacy leakage are caused by communicating with risky users....

Share article

UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing

Unmanned and aerial systems as interactors among different system components for communications, have opened up great opportunities for truth data discovery in Mobile Crowd Sensing (MCS) which has not...

Share article

Semi-supervised learning based hybrid beamforming under time-varying propagation environments

Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation...

Share article

Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model

Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive...

Share article

Certificateless threshold signature from lattice

Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes...

Share article

Game theory attack pricing for mining pools in blockchain-based IoT

The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining...

Share article

A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus...

Share article

Strengthening network slicing for Industrial Internet with deep reinforcement learning

Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain. Its highly heterogeneous...

Share article

A hierarchical blockchain-enabled security-threat assessment architecture for IoV

In Internet of Vehicles (IoV), the security-threat information of various traffic elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy leakage. Consequently, it is...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.