Recent Articles

Open access

ISSN: 2352-8648

Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT

In view of the randomness distribution of multiple users in the dynamic large-scale Internet of Things (IoT) scenario, comprehensively formulating available resources for fog nodes in the area and achieving...

Share article

Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges

Satellite-Terrestrial integrated Networks (STNs) have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity. However, STNs suffer from...

Share article

Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks

Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emissions and electricity expenses of base stations. However, renewable energy is inherently stochastic...

Share article

Echo state network based symbol detection in chaotic baseband wireless communication

The Chaotic Baseband Wireless Communication System (CBWCS) is expected to eliminate the Inter-Symbol Interference (ISI) caused by multipath propagation by using the optimal decoding threshold that is...

Share article

Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment

Mobile bike-sharing services have been prevalently used in many cities as an important urban commuting service and a promising way to build smart cities, especially in the new era of 5G and Internet-of-Things...

Share article

Intrusion detection and prevention system for an IoT environment

Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable....

Share article

Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks

Unmanned Aerial Vehicles (UAVs) as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in B5G. Besides, dynamic resource allocation and...

Share article

A potential game-based outsourcing computation framework for multiple calculators

Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server. The traditional outsourcing computation model forbids...

Share article

Efficient and robust missing key tag identification for large-scale RFID systems

Radio Frequency Identification (RFID) technology has been widely used to identify missing items. In many applications, rapidly pinpointing key tags that are attached to favorable or valuable items is...

Share article

Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks

Mobile Edge Computing (MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy requirements. In this paper, we propose...

Share article

Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems

With the development of the Cyber-Physical Internet of Things System (CPIoTS), the number of Cyber-Physical System (CPS) applications accessed in networks has increased dramatically. Latency-sensitive...

Share article

Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities

As autonomous vehicles and the other supporting infrastructure (e.g., smart cities and intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) is getting increasingly...

Share article

PEPFL: A framework for a practical and efficient privacy-preserving federated learning

As an emerging joint learning model, federated learning is a promising way to combine model parameters of different users for training and inference without collecting users’ original data. However,...

Share article

Autonomous machine learning for early bot detection in the internet of things

The high costs incurred due to attacks and the increasing number of different devices in the Internet of Things (IoT) highlight the necessity of the early detection of botnets (i.e., a network of infected...

Share article

QoE oriented intelligent online learning evaluation technology in B5G scenario

Students' demand for online learning has exploded during the post-COVID-19 pandemic era. However, due to their poor learning experience, students' dropout rate and learning performance of online learning...

Share article

A malware propagation prediction model based on representation learning and graph convolutional networks

The traditional malware research is mainly based on its recognition and detection as a breakthrough point, without focusing on its propagation trends or predicting the subsequently infected nodes. The...

Share article

A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles

The application of artificial intelligence technology in Internet of Vehicles (IoV) has attracted great research interests with the goal of enabling smart transportation and traffic management. Meanwhile,...

Share article

Secure vehicular data communication in Named Data Networking

Vehicular data misuse may lead to traffic accidents and even loss of life, so it is crucial to achieve secure vehicular data communications. This paper focuses on secure vehicular data communications...

Share article

Traffic prediction enabled dynamic access points switching for energy saving in dense networks

To meet the ever-increasing traffic demand and enhance the coverage of cellular networks, network densification is one of the crucial paradigms of 5G and beyond mobile networks, which can improve system...

Share article

Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage

Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising...

Share article

3-Multi ranked encryption with enhanced security in cloud computing

Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple...

Share article

Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view

The field of mobility prediction has been widely investigated in the recent past, especially the reduction of the coverage radius of cellular networks, which led to an increase in hand-over events....

Share article

VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems

Federated learning for edge computing is a promising solution in the data booming era, which leverages the computation ability of each edge device to train local models and only shares the model gradients...

Share article

Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks

In this paper, we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle (UAV)-enabled communication in Device-to-Device (D2D) networks. Our objective is to maximize...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.