Recent Articles

Open access

ISSN: 2352-8648

AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network

The prediction for Multivariate Time Series (MTS) explores the interrelationships among variables at historical moments, extracts their relevant characteristics, and is widely used in finance, weather,...

Share article

A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services

Data is becoming increasingly personal. Individuals regularly interact with a variety of structured data, ranging from SQLite databases on the phone to personal sensors and open government data. The...

Share article

CPFinder: Finding an unknown caller's profession from anonymized mobile phone data

Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries,...

Share article

Enhancing IoT anomaly detection performance for federated learning

Federated Learning (FL) with mobile computing and the Internet of Things (IoT) is an effective cooperative learning approach. However, several technical challenges still need to be addressed. For instance,...

Share article

RFID-based 3D human pose tracking: A subject generalization approach

Three-dimensional (3D) human pose tracking has recently attracted more and more attention in the computer vision field. Real-time pose tracking is highly useful in various domains such as video surveillance,...

Share article

EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks

Cloud data centers have become overwhelmed with data-intensive applications due to the limited computational capabilities of mobile terminals. Mobile edge computing is emerging as a potential paradigm...

Share article

Multi-agent reinforcement learning for edge information sharing in vehicular networks

To guarantee the heterogeneous delay requirements of the diverse vehicular services, it is necessary to design a full cooperative policy for both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle...

Share article

Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack

Eavesdropping attacks have become one of the most common attacks on networks because of their easy implementation. Eavesdropping attacks not only lead to transmission data leakage but also develop into...

Share article

Research on encoding and decoding of non-binary polar codes over GF(2m)

Binary Polar Codes (BPCs) have advantages of high-efficiency and capacity-achieving but suffer from large latency due to the Successive-Cancellation List (SCL) decoding. Non-Binary Polar Codes (NBPCs)...

Share article

Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing

Mobile Edge Computing (MEC) has been envisioned as an efficient solution to provide computation-intensive yet latency-sensitive services for wireless devices. In this paper, we investigate the optimal...

Share article

A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network

The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless...

Share article

An efficient data aggregation scheme with local differential privacy in smart grid

By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the...

Share article

Simultaneous wireless information and power transfer with fixed and adaptive modulation

Activating Wireless Power Transfer (WPT) in Radio-Frequency (RF) to provide on-demand energy supply to widely deployed Internet of Everything devices is a key to the next-generation energy self-sustainable...

Share article

A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey

The current power grid confronts severe challenges in satisfying customers' demands. Fast transition to the much more flexible power grid enriched with renewable energies, micro-grid, and distributed...

Share article

Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction

Traffic flow prediction is an important part of the intelligent transportation system. Accurate multi-step traffic flow prediction plays an important role in improving the operational efficiency of...

Share article

Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning

As an essential function of encrypted Internet traffic analysis, encrypted traffic service classification can support both coarse-grained network service traffic management and security supervision....

Share article

Guest editorial

Share article

Design of modified model of intelligent assembly digital twins based on optical fiber sensor network

Intelligent assembly of large-scale, complex structures using an intelligent manufacturing platform represents the future development direction for industrial manufacturing. During large-scale structural...

Share article

A dynamic and resource sharing virtual network mapping algorithm

Network virtualization can effectively establish dedicated virtual networks to implement various network functions. However, the existing research works have some shortcomings, for example, although...

Share article

Time to forge ahead: The Internet of Things for healthcare

Situated at the intersection of technology and medicine, the Internet of Things (IoT) holds the promise of addressing some of healthcare's most pressing challenges, from medical error, to chronic drug...

Share article

Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing

To efficiently complete a complex computation task, the complex task should be decomposed into sub-computation tasks that run parallel in edge computing. Wireless Sensor Network (WSN) is a typical application...

Share article

Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract

The huge increase in the communication network rate has made the application fields and scenarios for vehicular ad hoc networks more abundant and diversified, and proposed more requirements for the...

Share article

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities

Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during...

Share article

Fast and scalable routing protocols for data center networks

Data center networks may comprise tens or hundreds of thousands of nodes, and, naturally, suffer from frequent software and hardware failures as well as link congestions. Packets are routed along the...

Share article

FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment

The emergence of on-demand service provisioning by Federated Cloud Providers (FCPs) to Cloud Users (CU) has fuelled significant innovations in cloud provisioning models. Owing to the massive traffic,...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.