Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

A hierarchical blockchain-enabled distributed federated learning system with model-contribution based rewarding

Distributed Federated Learning (DFL) technology enables participants to cooperatively train a shared model while preserving the privacy of their local data sets, making it a desirable solution for decentralized...

Share article

A fast and accurate multi-keyword sorted searchable scheme based on blockchain

The multi-keyword sorted searchable encryption is a practical and secure data processing technique. However, most of the existing schemes require each data owner to calculate and store the Inverse Document...

Share article

Perceptual point cloud qality assessment for immersive metaverse experience

Perceptual quality assessment for point cloud is critical for immersive metaverse experience and is a challenging task. Firstly, because point cloud is formed by unstructured 3D points that makes the...

Share article

Adaptive multi-channel Bayesian graph attention network for IoT transaction security

With the rapid advancement of 5G technology, the Internet of Things (IoT) has entered a new phase of applications and is rapidly becoming a significant force in promoting economic development. Due to...

Share article

Joint computation offloading and parallel scheduling to maximize delay-guarantee in cooperative MEC systems

The growing development of the Internet of Things (IoT) is accelerating the emergence and growth of new IoT services and applications, which will result in massive amounts of data being generated, transmitted...

Share article

BLS-identification: A device fingerprint classification mechanism based on broad learning for Internet of Things

The popularity of the Internet of Things (IoT) has enabled a large number of vulnerable devices to connect to the Internet, bringing huge security risks. As a network-level security authentication method,...

Share article

GraphSTGAN: Situation understanding network of slow-fast high maneuvering targets for maritime monitor services of IoT data

With the rapid growth of the maritime Internet of Things (IoT) devices for Maritime Monitor Services (MMS), maritime traffic controllers could not handle a massive amount of data in time. For unmanned...

Share article

Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations

Low-Earth Orbit Satellite Constellations (LEO-SCs) provide global, high-speed, and low latency Internet access services, which bridges the digital divide in the remote areas. As inter-satellite links...

Share article

A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing

The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network, so it has promoted the applications of crowd-sensing services in different fields,...

Share article

Extended context-based semantic communication system for text transmission

Context information is significant for semantic extraction and recovery of messages in semantic communication. However, context information is not fully utilized in the existing semantic communication...

Share article

A highly reliable encoding and decoding communication framework based on semantic information

Increasing research has focused on semantic communication, the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver. In this paper, we design...

Share article

Starlet: Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT

The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things. To guarantee the network's overall security, we present a...

Share article

Resource management at the network edge for federated learning

Federated learning has been explored as a promising solution for training machine learning models at the network edge, without sharing private user data. With limited resources at the edge, new solutions...

Share article

Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach

Existing web-based security applications have failed in many situations due to the great intelligence of attackers. Among web applications, Cross-Site Scripting (XSS) is one of the dangerous assaults...

Share article

CCM-FL: Covert communication mechanisms for federated learning in crowd sensing IoT

The past decades have witnessed a wide application of federated learning in crowd sensing, to handle the numerous data collected by the sensors and provide the users with precise and customized services....

Share article

Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things

As an ingenious convergence between the Internet of Things and social networks, the Social Internet of Things (SIoT) can provide effective and intelligent information services and has become one of...

Share article

UAV-assisted data collection for wireless sensor networks with dynamic working modes

Wireless Sensor Network (WSN) is a cornerstone of Internet of Things (IoT) and has rich application scenarios. In this work, we consider a heterogeneous WSN whose sensor nodes have a diversity in their...

Share article

Semantic segmentation-based semantic communication system for image transmission

With the rapid development of artificial intelligence and the widespread use of the Internet of Things, semantic communication, as an emerging communication paradigm, has been attracting great interest....

Share article

Depressive semantic awareness from vlog facial and vocal streams via spatio-temporal transformer

With the rapid growth of information transmission via the Internet, efforts have been made to reduce network load to promote efficiency. One such application is semantic computing, which can extract...

Share article

Network traffic classification: Techniques, datasets, and challenges

In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception,...

Share article

Behaviour recognition based on the integration of multigranular motion features in the Internet of Things

With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices, crowdsensing systems in the Internet of Things (IoT) are now conducting complicated...

Share article

A survey on semantic communications: Technologies, solutions, applications and challenges

Semantic Communication (SC) has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput...

Share article

An improved pulse coupled neural networks model for semantic IoT

In recent years, the Internet of Things (IoT) has gradually developed applications such as collecting sensory data and building intelligent services, which has led to an explosion in mobile data traffic....

Share article

Artificial intelligence in physiological characteristics recognition for internet of things authentication

Effective user authentication is key to ensuring equipment security, data privacy, and personalized services in Internet of Things (IoT) systems. However, conventional mode-based authentication methods...

Share article

Adversarial attacks and defenses for digital communication signals identification

As modern communication technology advances apace, the digital communication signals identification plays an important role in cognitive radio networks, the communication monitoring and management systems....

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.