Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Efficient signal detector design for OTFS with index modulation

In this paper, efficient signal detectors are designed for Orthogonal Time Frequency Space (OTFS) modulation with Index Modulation (IM) systems. Firstly, the Minimum Mean Squared Error (MMSE) based...

Share article

Position-aware packet loss optimization on service function chain placement

The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of...

Share article

A dynamic algorithm for trust inference based on double DQN in the internet of things

The development of the Internet of Things (IoT) has brought great convenience to people. However, some information security problems such as privacy leakage are caused by communicating with risky users....

Share article

UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing

Unmanned and aerial systems as interactors among different system components for communications, have opened up great opportunities for truth data discovery in Mobile Crowd Sensing (MCS) which has not...

Share article

Semi-supervised learning based hybrid beamforming under time-varying propagation environments

Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation...

Share article

Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model

Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive...

Share article

Certificateless threshold signature from lattice

Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes...

Share article

Game theory attack pricing for mining pools in blockchain-based IoT

The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining...

Share article

A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus...

Share article

Strengthening network slicing for Industrial Internet with deep reinforcement learning

Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain. Its highly heterogeneous...

Share article

A hierarchical blockchain-enabled security-threat assessment architecture for IoV

In Internet of Vehicles (IoV), the security-threat information of various traffic elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy leakage. Consequently, it is...

Share article

Game theory in network security for digital twins in industry

To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based...

Share article

Attention-relation network for mobile phone screen defect classification via a few samples

How to use a few defect samples to complete the defect classification is a key challenge in the production of mobile phone screens. An attention-relation network for the mobile phone screen defect classification...

Share article

Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes

This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer (SWIPT)-based multi-relay network with a direct link. To achieve high throughput in the network, a novel protocol is...

Share article

OAM mode purity improvement based on antenna array

Orbital Angular Momentum (OAM) waves are characterized by helical wave fronts and orthogonality between different modes. Therefore, OAM waves have huge potential in improving wireless communications'...

Share article

Energy-optimal DNN model placement in UAV-enabled edge computing networks

Unmanned aerial vehicle (UAV)-enabled edge computing is emerging as a potential enabler for Artificial Intelligence of Things (AIoT) in the forthcoming sixth-generation (6G) communication networks....

Share article

Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG

The path planning of Unmanned Aerial Vehicle (UAV) is a critical issue in emergency communication and rescue operations, especially in adversarial urban environments. Due to the continuity of the flying...

Share article

Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment

In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved...

Share article

Application of maximum rank distance codes in designing of STBC-OFDM system for next-generation wireless communications

Space-Time Block Coded (STBC) Orthogonal Frequency Division Multiplexing (OFDM) satisfies higher data-rate requirements while maintaining signal quality in a multipath fading channel. However, conventional...

Share article

Trust-based co-operative routing for secure communication in mobile ad hoc networks

The working of a Mobile Ad hoc NETwork (MANET) relies on the supportive cooperation among the network nodes. But due to its intrinsic features, a misbehaving node can easily lead to a routing disorder....

Share article

Diversified and compatible web APIs recommendation based on game theory in IoT

With the ever-increasing popularity of Internet of Things (IoT), massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces...

Share article

Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing

We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the...

Share article

AoI-aware transmission control in real-time mmwave energy harvesting systems: a risk-sensitive reinforcement learning approach

The evolution of enabling technologies in wireless communications has paved the way for supporting novel applications with more demanding QoS requirements, but at the cost of increasing the complexity...

Share article

F-norm based low-power motion recognition on wearable devices in the presence of outlier motions

Motion recognition refers to the intelligent recognition of human motion using data collected from wearable sensors, which exceedingly has gained significant interest from both academic and industrial...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.