Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Capacity and delay performance analysis for large-scale UAV-enabled wireless networks

In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files...

Share article

Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems

This paper exploits multi-modal Physical (PHY)-layer features in terms of artificial fingerprint, In-phase/Quadrature (IQ) imbalance and Angle of Arrival (AoA) to propose a novel PHY-layer authentication...

Share article

Cross-feature fusion speech emotion recognition based on attention mask residual network and Wav2vec 2.0

Speech Emotion Recognition (SER) has received widespread attention as a crucial way for understanding human emotional states. However, the impact of irrelevant information on speech signals and data...

Share article

A deep-learning-based MAC for integrating channel access, rate adaptation, and channel switch

With increasing density and heterogeneity in unlicensed wireless networks, traditional MAC protocols, such as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) in Wi-Fi networks, are...

Share article

6G Smart fog radio access network: architecture, key technologies, and research challenges

The 6G smart fog radio access network (F-RAN) is an integration of 6G network intelligence technologies and the F-RAN architecture. Its aim is to provide low-latency and high-performance services for...

Share article

Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme

This paper studies a cooperative relay transmission system within the framework of Multiple-Input Multiple-Output Radio Frequency/Underwater Optical Wireless Communication (MIMO-RF/UOWC), aiming to...

Share article

DB-FL: DAG blockchain-enabled generalized federated dropout learning

To protect user privacy and data security, the integration of Federated Learning (FL) and blockchain has become an emerging research hotspot. However, the limited throughput and high communication complexity...

Share article

Reinforcement learning-enabled swarm intelligence method for computation task offloading in Internet-of-Things blockchain

Blockchain technology, based on decentralized data storage and distributed consensus design, has became a promising solution to address data security risks and provide privacy protection in the Internet-of-Things...

Share article

Irregular IRS-aided SWIPT secure communication system with imperfect CSI

The performance of traditional regular Intelligent Reflecting Surface (IRS) improves as the number of IRS elements increases, but more reflecting elements lead to higher IRS power consumption and greater...

Share article

A consensus-based solution for cryptocurrencies arbitrage bots in intelligent blockchain

Intelligent blockchain is an emerging field that integrates Artificial Intelligence (AI) techniques with blockchain networks, with a particular emphasis on improving the performance of blockchain, especially...

Share article

Intelligent joint communication and computation scheme of UAV-assisted Offloading in high speed rail scenarios

With the continuous development of communication and computation technologies, large bandwidth services place higher demands on computing capacity and throughput in High-Speed Rail (HSR) scenarios....

Share article

Secure cognitive health monitoring using a directed acyclic graph-based and AI-enhanced IoMT framework

Millions of people throughout the world struggle with mental health disorders, but the widespread stigma associated with these issues often prevents them from seeking treatment. We propose a novel strategy...

Share article

Towards privacy-preserving and efficient word vector learning for lightweight IoT devices

Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the...

Share article

A compatible carbon efficiency information service framework based on the industrial internet identification

Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth. If explainable and available carbon emission data can be accurately...

Share article

Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities

Unmanned Aerial Vehicles (UAVs) are gaining increasing attention in many fields, such as military, logistics, and hazardous site mapping. Utilizing UAVs to assist communications is one of the promising...

Share article

Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper

In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical...

Share article

Vehicle-oriented ridesharing package delivery in blockchain system

Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage. Most existing ridesharing systems operate the matching of ridesharing in a centralized...

Share article

Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach

Cooperative communication through energy harvested relays in Cognitive Internet of Things (CIoT) has been envisioned as a promising solution to support massive connectivity of Cognitive Radio (CR) based...

Share article

Scheduling optimization for UAV communication coverage using virtual force-based PSO model

When the ground communication base stations in the target area are severely destroyed, the deployment of Unmanned Aerial Vehicle (UAV) ad hoc networks can provide people with temporary communication...

Share article

Factors affecting forensic electric network frequency matching – A comprehensive study

The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification. It is known as the Electric Network...

Share article

XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning

Federated Learning (FL), a burgeoning technology, has received increasing attention due to its privacy protection capability. However, the base algorithm FedAvg is vulnerable when it suffers from so-called...

Share article

DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet

In recent years, the Industrial Internet and Industry 4.0 came into being. With the development of modern industrial intelligent manufacturing technology, digital twins, Web3 and many other digital...

Share article

Data-driven human and bot recognition from web activity logs based on hybrid learning techniques

Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability...

Share article

Downlink network-coded multiple access with diverse power

Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when...

Share article

A new adaptive co-site broadband interference cancellation method with auxiliary channel

With the boom of the communication systems on some independent platforms (such as satellites, space stations, airplanes, and vessels), co-site interference is becoming prominent. The adaptive interference...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.