Secure cognitive health monitoring using a directed acyclic graph-based and AI-enhanced IoMT framework
Available online 3 September 2024
Millions of people throughout the world struggle with mental health disorders, but the widespread stigma associated with these issues often prevents them from seeking treatment. We propose a novel strategy...
Share article
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices
August 2024
Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the...
Share article
A compatible carbon efficiency information service framework based on the industrial internet identification
August 2024
Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth. If explainable and available carbon emission data can be accurately...
Share article
Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities
August 2024
Unmanned Aerial Vehicles (UAVs) are gaining increasing attention in many fields, such as military, logistics, and hazardous site mapping. Utilizing UAVs to assist communications is one of the promising...
Share article
Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper
August 2024
In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical...
Share article
Vehicle-oriented ridesharing package delivery in blockchain system
August 2024
Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage. Most existing ridesharing systems operate the matching of ridesharing in a centralized...
Share article
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach
August 2024
Cooperative communication through energy harvested relays in Cognitive Internet of Things (CIoT) has been envisioned as a promising solution to support massive connectivity of Cognitive Radio (CR) based...
Share article
Scheduling optimization for UAV communication coverage using virtual force-based PSO model
August 2024
When the ground communication base stations in the target area are severely destroyed, the deployment of Unmanned Aerial Vehicle (UAV) ad hoc networks can provide people with temporary communication...
Share article
Factors affecting forensic electric network frequency matching – A comprehensive study
August 2024
The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification. It is known as the Electric Network...
Share article
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning
August 2024
Federated Learning (FL), a burgeoning technology, has received increasing attention due to its privacy protection capability. However, the base algorithm FedAvg is vulnerable when it suffers from so-called...
Share article
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet
August 2024
In recent years, the Industrial Internet and Industry 4.0 came into being. With the development of modern industrial intelligent manufacturing technology, digital twins, Web3 and many other digital...
Share article
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques
August 2024
Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability...
Share article
Downlink network-coded multiple access with diverse power
August 2024
Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when...
Share article
A new adaptive co-site broadband interference cancellation method with auxiliary channel
August 2024
With the boom of the communication systems on some independent platforms (such as satellites, space stations, airplanes, and vessels), co-site interference is becoming prominent. The adaptive interference...
Share article
Efficient signal detector design for OTFS with index modulation
August 2024
In this paper, efficient signal detectors are designed for Orthogonal Time Frequency Space (OTFS) modulation with Index Modulation (IM) systems. Firstly, the Minimum Mean Squared Error (MMSE) based...
Share article
Position-aware packet loss optimization on service function chain placement
August 2024
The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of...
Share article
A dynamic algorithm for trust inference based on double DQN in the internet of things
August 2024
The development of the Internet of Things (IoT) has brought great convenience to people. However, some information security problems such as privacy leakage are caused by communicating with risky users....
Share article
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing
August 2024
Unmanned and aerial systems as interactors among different system components for communications, have opened up great opportunities for truth data discovery in Mobile Crowd Sensing (MCS) which has not...
Share article
Semi-supervised learning based hybrid beamforming under time-varying propagation environments
August 2024
Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation...
Share article
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model
August 2024
Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive...
Share article
Certificateless threshold signature from lattice
August 2024
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes...
Share article
Game theory attack pricing for mining pools in blockchain-based IoT
August 2024
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining...
Share article
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
August 2024
The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus...
Share article
Strengthening network slicing for Industrial Internet with deep reinforcement learning
August 2024
Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain. Its highly heterogeneous...
Share article
A hierarchical blockchain-enabled security-threat assessment architecture for IoV
August 2024
In Internet of Vehicles (IoV), the security-threat information of various traffic elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy leakage. Consequently, it is...
Share article