Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT
Available online 22 June 2022
In view of the randomness distribution of multiple users in the dynamic large-scale Internet of Things (IoT) scenario, comprehensively formulating available resources for fog nodes in the area and achieving...
Share article
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges
Available online 21 June 2022
Satellite-Terrestrial integrated Networks (STNs) have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity. However, STNs suffer from...
Share article
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks
Available online 18 June 2022
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emissions and electricity expenses of base stations. However, renewable energy is inherently stochastic...
Share article
Echo state network based symbol detection in chaotic baseband wireless communication
Available online 18 June 2022
The Chaotic Baseband Wireless Communication System (CBWCS) is expected to eliminate the Inter-Symbol Interference (ISI) caused by multipath propagation by using the optimal decoding threshold that is...
Share article
Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment
Available online 16 June 2022
Mobile bike-sharing services have been prevalently used in many cities as an important urban commuting service and a promising way to build smart cities, especially in the new era of 5G and Internet-of-Things...
Share article
Intrusion detection and prevention system for an IoT environment
Available online 16 June 2022
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable....
Share article
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks
Available online 14 June 2022
Unmanned Aerial Vehicles (UAVs) as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in B5G. Besides, dynamic resource allocation and...
Share article
A potential game-based outsourcing computation framework for multiple calculators
Available online 9 June 2022
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server. The traditional outsourcing computation model forbids...
Share article
Efficient and robust missing key tag identification for large-scale RFID systems
Available online 9 June 2022
Radio Frequency Identification (RFID) technology has been widely used to identify missing items. In many applications, rapidly pinpointing key tags that are attached to favorable or valuable items is...
Share article
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks
Available online 6 June 2022
Mobile Edge Computing (MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy requirements. In this paper, we propose...
Share article
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems
Available online 6 June 2022
With the development of the Cyber-Physical Internet of Things System (CPIoTS), the number of Cyber-Physical System (CPS) applications accessed in networks has increased dramatically. Latency-sensitive...
Share article
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities
Available online 6 June 2022
As autonomous vehicles and the other supporting infrastructure (e.g., smart cities and intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) is getting increasingly...
Share article
PEPFL: A framework for a practical and efficient privacy-preserving federated learning
Available online 1 June 2022
As an emerging joint learning model, federated learning is a promising way to combine model parameters of different users for training and inference without collecting users’ original data. However,...
Share article
Autonomous machine learning for early bot detection in the internet of things
Available online 1 June 2022
The high costs incurred due to attacks and the increasing number of different devices in the Internet of Things (IoT) highlight the necessity of the early detection of botnets (i.e., a network of infected...
Share article
QoE oriented intelligent online learning evaluation technology in B5G scenario
Available online 1 June 2022
Students' demand for online learning has exploded during the post-COVID-19 pandemic era. However, due to their poor learning experience, students' dropout rate and learning performance of online learning...
Share article
A malware propagation prediction model based on representation learning and graph convolutional networks
Available online 31 May 2022
The traditional malware research is mainly based on its recognition and detection as a breakthrough point, without focusing on its propagation trends or predicting the subsequently infected nodes. The...
Share article
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles
Available online 31 May 2022
The application of artificial intelligence technology in Internet of Vehicles (IoV) has attracted great research interests with the goal of enabling smart transportation and traffic management. Meanwhile,...
Share article
Secure vehicular data communication in Named Data Networking
Available online 29 May 2022
Vehicular data misuse may lead to traffic accidents and even loss of life, so it is crucial to achieve secure vehicular data communications. This paper focuses on secure vehicular data communications...
Share article
Traffic prediction enabled dynamic access points switching for energy saving in dense networks
Available online 28 May 2022
To meet the ever-increasing traffic demand and enhance the coverage of cellular networks, network densification is one of the crucial paradigms of 5G and beyond mobile networks, which can improve system...
Share article
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage
Available online 28 May 2022
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising...
Share article
3-Multi ranked encryption with enhanced security in cloud computing
Available online 27 May 2022
Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple...
Share article
Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view
Available online 27 May 2022
The field of mobility prediction has been widely investigated in the recent past, especially the reduction of the coverage radius of cellular networks, which led to an increase in hand-over events....
Share article
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
Available online 24 May 2022
Federated learning for edge computing is a promising solution in the data booming era, which leverages the computation ability of each edge device to train local models and only shares the model gradients...
Share article
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks
Available online 21 May 2022
In this paper, we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle (UAV)-enabled communication in Device-to-Device (D2D) networks. Our objective is to maximize...
Share article