Efficient signal detector design for OTFS with index modulation
August 2024
In this paper, efficient signal detectors are designed for Orthogonal Time Frequency Space (OTFS) modulation with Index Modulation (IM) systems. Firstly, the Minimum Mean Squared Error (MMSE) based...
Share article
Position-aware packet loss optimization on service function chain placement
August 2024
The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of...
Share article
A dynamic algorithm for trust inference based on double DQN in the internet of things
August 2024
The development of the Internet of Things (IoT) has brought great convenience to people. However, some information security problems such as privacy leakage are caused by communicating with risky users....
Share article
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing
August 2024
Unmanned and aerial systems as interactors among different system components for communications, have opened up great opportunities for truth data discovery in Mobile Crowd Sensing (MCS) which has not...
Share article
Semi-supervised learning based hybrid beamforming under time-varying propagation environments
August 2024
Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation...
Share article
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model
August 2024
Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive...
Share article
Certificateless threshold signature from lattice
August 2024
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes...
Share article
Game theory attack pricing for mining pools in blockchain-based IoT
August 2024
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining...
Share article
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
August 2024
The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus...
Share article
Strengthening network slicing for Industrial Internet with deep reinforcement learning
August 2024
Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain. Its highly heterogeneous...
Share article
A hierarchical blockchain-enabled security-threat assessment architecture for IoV
August 2024
In Internet of Vehicles (IoV), the security-threat information of various traffic elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy leakage. Consequently, it is...
Share article
Game theory in network security for digital twins in industry
August 2024
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based...
Share article
Attention-relation network for mobile phone screen defect classification via a few samples
August 2024
How to use a few defect samples to complete the defect classification is a key challenge in the production of mobile phone screens. An attention-relation network for the mobile phone screen defect classification...
Share article
Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes
August 2024
This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer (SWIPT)-based multi-relay network with a direct link. To achieve high throughput in the network, a novel protocol is...
Share article
OAM mode purity improvement based on antenna array
August 2024
Orbital Angular Momentum (OAM) waves are characterized by helical wave fronts and orthogonality between different modes. Therefore, OAM waves have huge potential in improving wireless communications'...
Share article
Energy-optimal DNN model placement in UAV-enabled edge computing networks
August 2024
Unmanned aerial vehicle (UAV)-enabled edge computing is emerging as a potential enabler for Artificial Intelligence of Things (AIoT) in the forthcoming sixth-generation (6G) communication networks....
Share article
Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG
August 2024
The path planning of Unmanned Aerial Vehicle (UAV) is a critical issue in emergency communication and rescue operations, especially in adversarial urban environments. Due to the continuity of the flying...
Share article
Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment
August 2024
In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved...
Share article
Application of maximum rank distance codes in designing of STBC-OFDM system for next-generation wireless communications
August 2024
Space-Time Block Coded (STBC) Orthogonal Frequency Division Multiplexing (OFDM) satisfies higher data-rate requirements while maintaining signal quality in a multipath fading channel. However, conventional...
Share article
Trust-based co-operative routing for secure communication in mobile ad hoc networks
August 2024
The working of a Mobile Ad hoc NETwork (MANET) relies on the supportive cooperation among the network nodes. But due to its intrinsic features, a misbehaving node can easily lead to a routing disorder....
Share article
Diversified and compatible web APIs recommendation based on game theory in IoT
August 2024
With the ever-increasing popularity of Internet of Things (IoT), massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces...
Share article
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing
August 2024
We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the...
Share article
AoI-aware transmission control in real-time mmwave energy harvesting systems: a risk-sensitive reinforcement learning approach
Available online 30 August 2024
The evolution of enabling technologies in wireless communications has paved the way for supporting novel applications with more demanding QoS requirements, but at the cost of increasing the complexity...
Share article
F-norm based low-power motion recognition on wearable devices in the presence of outlier motions
Available online 22 August 2024
Motion recognition refers to the intelligent recognition of human motion using data collected from wearable sensors, which exceedingly has gained significant interest from both academic and industrial...
Share article