default search action
Digital Communications and Networks, Volume 8
Volume 8, Number 1, February 2022
- Yingchun Wang, Jingyi Wang, Weizhan Zhang, Yufeng Zhan, Song Guo, Qinghua Zheng, Xuanyu Wang:
A survey on deploying mobile deep learning applications: A systemic and technical perspective. 1-17 - Kang Tan, Duncan Bremner, Julien Le Kernec, Lei Zhang, Muhammad Imran:
Machine learning in vehicular networking: An overview. 18-24 - Mustafa K. Shawaqfeh, Osamah S. Badarneh:
Performance of mobile networks under composite F fading channels. 25-32 - Wei Song, Yu Wu, Yihui Cui, Qilie Liu, Yuan Shen, Zicheng Qiu, Jianjun Yao, Zhiyong Peng:
Public integrity verification for data sharing in cloud with asynchronous revocation. 33-43 - Lijun Dong, Richard Li:
Optimal chunk caching in network coding-based qualitative communication. 44-50 - Luping Qin, Haibo Li, Da Chen, Tao Jiang:
Peak shrinking and interpolating for PAPR reduction in M-IFoF-based mobile fronthaul. 51-57 - Dejin Kong, Xing Zheng, Yukang Tian, Tao Jiang, Yue Zhang:
Alamouti code based on block repetition in FBMC/OQAM systems. 58-63 - Yudith Cardinale, Gabriel Freites, Edgar Valderrama, Ana Isabel Aguilera, Chinnapong Angsuchotmetee:
Semantic framework of event detection in emergency situations for smart buildings. 64-79 - Adnan O. M. Abuassba, Dezheng Zhang, Hazrat Ali, Fan Zhang, Ali Khan:
Classification with ensembles and case study on functional magnetic resonance imaging. 80-86
Volume 8, Number 2, April 2022
- Miguel Dajer, Zhengxiang Ma, Leonard Piazzi, Narayan Prasad, Xiao-Feng Qi, Baoling Sheen, Jin Yang, Guosen Yue:
Reconfigurable intelligent surface: design the channel - a new opportunity for future wireless networks. 87-104 - Jorge Gallego-Madrid, Ramon Sanchez-Iborra, Pedro M. Ruiz, Antonio F. Skarmeta:
Machine learning-based zero-touch network and service management: a survey. 105-123 - Kyungroul Lee, Kangbin Yim:
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT. 124-131 - Kyle Manning, Xiaojun Zhai, Wangyang Yu:
Image analysis and machine learning-based malaria assessment system. 132-142 - Shujun Liang, Jing Cheng, Jianwei Zhang:
Research on data load balancing technology of massive storage systems for wearable devices. 143-149 - Salman Shamshad, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Shehzad Ashraf Chaudhry, Chien-Ming Chen:
An enhanced scheme for mutual authentication for healthcare services. 150-161 - Wafa Batayneh, Enas W. Abdulhay, Mohammad Alothman:
Comparing the efficiency of artificial neural networks in sEMG-based simultaneous and continuous estimation of hand kinematics. 162-173 - Linbo Deng, Jinsong Gui, Tian Wang, Jiawei Tan, Xiong Li:
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system. 174-185 - Tianji Dai, Yunpeng Xiao, Xia Liang, Qian Li, Tun Li:
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM. 186-193 - Wiroonsak Santipach, Kaemmatat Jiravanstit:
On selecting transmission mode for D2D transmitter in underlay cellular network with a multi-antenna base station. 194-207 - Hao Xie, Yongjun Xu:
Robust resource allocation for NOMA-assisted heterogeneous networks. 208-214 - Neng Ye, Jihong Yu, Aihua Wang, Rongrong Zhang:
Help from space: grant-free massive access for satellite-based IoT in the 6G era. 215-224 - Chen Wang, Jian Chen, Yang Yang, Xiaoqiang Ma, Jiangchuan Liu:
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects. 225-234
Volume 8, Number 3, June 2022
- Ruidong Li, Shiwen Mao, Periklis Chatzimisios, Constandinos X. Mavromoustakis:
Guest editorial. 235-236 - Yao Lu, Lu Liu, Jiayan Gu, John Panneerselvam, Bo Yuan:
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks. 237-246 - Yang Li, Tianshun Wang, Yuan Wu, Weijia Jia:
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing. 247-256 - Kiyoshy Nakamura, Pietro Manzoni, Alessandro Redondi, Edoardo Longo, Marco Zennaro, Juan-Carlos Cano, Carlos T. Calafate:
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services. 257-266 - Ruyan Wang, Xue Jiang, Yujie Zhou, Zhidu Li, Dapeng Wu, Tong Tang, Alexander A. Fedotov, Vladimir Badenko:
Multi-agent reinforcement learning for edge information sharing in vehicular networks. 267-277 - Chao Yang, Xuyu Wang, Shiwen Mao:
RFID-based 3D human pose tracking: A subject generalization approach. 278-288 - Zihan Chen, Guang Cheng, Ziheng Xu, Shuyi Guo, Yuyang Zhou, Yuyu Zhao:
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning. 289-302 - Jie Hu, Guangming Liang, Qin Yu, Kun Yang, Xiaofeng Lu:
Simultaneous wireless information and power transfer with fixed and adaptive modulation. 303-313 - Brett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu:
Enhancing IoT anomaly detection performance for federated learning. 314-323 - Jiaquan Zhang, Hui Chen, Xiaoming Yao, Xiaoming Fu:
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data. 324-332 - Na Gai, Kaiping Xue, Bin Zhu, Jiayu Yang, Jianqing Liu, Debiao He:
An efficient data aggregation scheme with local differential privacy in smart grid. 333-342
- Jihua Ye, Shengjun Xue, Aiwen Jiang:
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction. 343-350 - Yogesh Tripathi, Arun Prakash, Rajeev Tripathi:
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network. 351-358 - Shufeng Li, Mingyu Cai, Robert Edwards, Yao Sun, Libiao Jin:
Research on encoding and decoding of non-binary polar codes over GF(2m). 359-372 - Xiaoyu Xu, Hao Hu, Yuling Liu, Jinglei Tan, Hongqi Zhang, Haotian Song:
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. 373-387 - Zahra Alavikia, Maryam Shabro:
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey. 388-410
Volume 8, Number 4, August 2022
- Dan Deng, Xingwang Li, Varun G. Menon, Md. Jalil Piran, Hui Chen, Mian Ahmad Jan:
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks. 415-421 - Yu Zheng, Zheng Li, Xiaolong Xu, Qingzhan Zhao:
Dynamic defenses in cyber security: Techniques, methods and challenges. 422-435 - Alaa Omran Almagrabi, Ali Kashif Bashir:
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications. 436-445 - Chen Wang, Xinkui Wu, Gaoyang Liu, Tianping Deng, Kai Peng, Shaohua Wan:
Safeguarding cross-silo federated learning with local differential privacy. 446-454 - Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths. 455-465 - Jie Song, Pengyi Zhang, Mohammed Alkubati, Yubin Bao, Ge Yu:
Research advances on blockchain-as-a-service: architectures, applications and challenges. 466-475 - Zhanyang Xu, Dawei Zhu, Jinhui Chen, Baohua Yu:
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing. 476-484 - Enmin Zhu, Jianjie Zhang, Jijie Yan, Kongyang Chen, Chongzhi Gao:
N-gram MalGAN: Evading machine learning detection via feature n-gram. 485-491 - Wanman Li, Xiaozhang Liu, Anli Yan, Jie Yang:
Kernel-based adversarial attacks and defenses on support vector classification. 492-497 - Yihong Yang, Sheng Ding, Yuwen Liu, Shunmei Meng, Xiaoxiao Chi, Rui Ma, Chao Yan:
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse. 498-507 - Qiyun Zhang, Xuyun Zhang, Hongsheng Hu, Caizhong Li, Yinping Lin, Rui Ma:
Sports match prediction model for training and exercise using attention-based LSTM network. 508-515 - Qi Zhang, Yingjie Wang, Zhipeng Cai, Xiangrong Tong:
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing. 516-530 - Ke Yan, Xiaokang Zhou:
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN. 531-539 - Ajay Kumar, Kumar Abhishek, Muhammad Rukunuddin Ghalib, Achyut Shankar, Xiaochun Cheng:
Intrusion detection and prevention system for an IoT environment. 540-551 - Dengcheng Yan, Yuchuan Zhao, Zhongxiu Yang, Ying Jin, Yiwen Zhang:
FedCDR: Privacy-preserving federated cross-domain recommendation. 552-560 - Seyed Navid Mousavi, Fengping Chen, Mahdi Abbasi, Mohammad Reza Khosravi, Milad Rafiee:
Efficient pipelined flow classification for intelligent data processing in IoT. 561-575 - Lingling Guo, Jingjing Chen, Shihan Li, Yafei Li, Jinzhi Lu:
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance. 576-587
Volume 8, Number 5, October 2022
- Zheng Yan, Qinghua Zheng, Yulei Wu, Yaliang Zhao, Mohammed Atiquzzaman:
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications. 589-590 - Haoxiang Han, Shufan Fei, Zheng Yan, Xiaokang Zhou:
A survey on blockchain-based integrity auditing for cloud data. 591-603 - Yiting Huang, Yong Yu, Huilin Li, Yannan Li, Aikui Tian:
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. 604-613 - Zhe Sun, Junping Wan, Lihua Yin, Zhiqiang Cao, Tianjie Luo, Bin Wang:
A blockchain-based audit approach for encrypted data in federated learning. 614-624 - Dan Wang, Bin Song, Yingjie Liu, Mingjun Wang:
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems. 625-635 - QinYang Miao, Hui Lin, Jia Hu, Xiaoding Wang:
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things. 636-643 - Linjie Wang, Youliang Tian, Jinbo Xiong:
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT. 644-653 - Duo Zhang, Youliang Tian, Linjie Wang:
A potential game-based outsourcing computation framework for multiple calculators. 654-663 - Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo:
Detecting conflict of heterogeneous access control policies. 664-679 - Fangchi Qin, Yan Wu, Fang Tao, Lu Liu, Leilei Shi, Anthony Miller:
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis. 680-686 - Liang Qiao, Shuping Dang, Basem Shihada, Mohamed-Slim Alouini, Robert M. Nowak, Zhihan Lv:
Can blockchain link the future? 687-694
- Shuaifei Chen, Jiayi Zhang, Jing Zhang, Emil Björnson, Bo Ai:
A survey on user-centric cell-free massive MIMO systems. 695-719 - Zixin Wang, Bin Cao, Chenxi Liu, Congfang Xu, Lei Zhang:
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges. 720-726 - Praveen Kumar Donta, Satish Narayana Srirama, Tarachand Amgoth, Chandra Sekhara Rao Annavarapu:
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions. 727-744 - Sancheng Peng, Lihong Cao, Yongmei Zhou, Zhouhao Ouyang, Aimin Yang, Xinguang Li, Weijia Jia, Shui Yu:
A survey on deep learning for textual emotion analysis in social networks. 745-762 - Suhaib Masroor, Chen Peng:
Observer-based event-triggered networked multi-drives speed consensus. 763-769 - Jianjun Yang:
An ellipse-guided routing algorithm in wireless sensor networks. 770-777 - Muhammad Salah Ud Din, Muhammad Atif Ur Rehman, Rehmat Ullah, Chan-Won Park, Dae Ho Kim, Byung-Seo Kim:
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things. 778-790 - Peng Jiang, Hongyi Wu, Chunsheng Xin:
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network. 791-803 - Baha' A. Alsaify, Dale R. Thompson, Abdallah Y. Alma'aitah, Jia Di:
Using dummy data for RFID tag and reader authentication. 804-813 - Anirudh Paranjothi, Mohammed Atiquzzaman:
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing. 814-824 - Qian Ren, Kui Liu, Lianming Zhang:
Multi-objective optimization for task offloading based on network calculus in fog environments. 825-833 - Yuan Zhi, Jie Tian, Xiaofang Deng, Jingping Qiao, Dianjie Lu:
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks. 834-842 - Dinkisa Aga Bulti, Jyri Hämäläinen, Beneyam B. Haile, Yihenew Wondie:
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks. 843-852 - Yi Shen, Zhiwen Pan, Nan Liu, Xiaohu You:
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology. 853-863
Volume 8, Number 6, December 2022
- Hexuan Hu, Zhen-Zhou Lin, Qiang Hu, Ye Zhang:
Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment. 868-876 - Shuai Xiao, Jiachen Yang, Zhihan Lv:
Protecting the trust and credibility of data by tracking forgery trace based on GANs. 877-884 - Liping Tao, Yang Lu, Xu Ding, Yuqi Fan, Jung Yoon Kim:
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage. 885-899 - Mahammad Shareef Mekala, Gautam Srivastava, Ju H. Park, Ho-Youl Jung:
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT. 900-910 - Tingyan Long, Yong Ma, Lei Wu, Yunni Xia, Ning Jiang, Jianqi Li, Xiaodong Fu, Xiangmi You, Bo Zhang:
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment. 911-922 - Chen Chen, Guorun Yao, Chenyu Wang, Sotirios K. Goudos, Shaohua Wan:
Enhancing the robustness of object detection via 6G vehicular edge computing. 923-931 - Xin Su, Su Jiang, Dongmin Choi:
Location privacy protection of maritime mobile terminals. 932-941 - Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang:
Effective short text classification via the fusion of hybrid features for IoT social data. 942-954 - Mingzhi Wang, Tao Wu, Tao Ma, Xiaochen Fan, Mingxing Ke:
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing. 955-963 - Zigui Jiang, Kai Chen, Hailin Wen, Zibin Zheng:
Applying blockchain-based method to smart contract classification for CPS applications. 964-975 - Ziming Liu, Yang Xu, Cheng Zhang, Haroon Elahi, Xiaokang Zhou:
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles. 976-983 - Xiaoxian Yang, Yueshen Xu, Yishan Zhou, Shengli Song, Yinchen Wu:
Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment. 984-994 - Zheng Xu, Chaofan Liu, Peng Zhang, Tun Lu, Ning Gu:
A blockchain-enabled wiki framework based on participatory design. 995-1004 - Wali Ullah Khan, Fida Hussain Memon, Kapal Dev, Muhammad Awais Javed, Dinh-Thuan Do, Nawab Muhammad Faseeh Qureshi:
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework. 1005-1013 - Shouli Zhang, Chen Liu, Xiaohong Li, Yanbo Han:
Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments. 1014-1026 - Adnan Ali, Jinlong Li, Huanhuan Chen, Ali Kashif Bashir:
Temporal pattern mining from user-generated content. 1027-1039
- Neha Bala, Aemun Ahmar, Wenjia Li, Fernanda Tovar, Arpit Battu, Prachi Bambarkar:
DroidEnemy: Battling adversarial example attacks for Android malware detection. 1040-1047 - Michael Pendo John Mahenge, Chunlin Li, Camilius A. Sanga:
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications. 1048-1058 - Anping Xiong, Guihua Liu, Qingyi Zhu, Ankui Jing, Seng W. Loke:
A notary group-based cross-chain mechanism. 1059-1067 - Fawaz S. Al-Anzi:
Design and analysis of intrusion detection systems for wireless mesh networks. 1068-1076 - Guoquan Li, Zijie Hong, Yu Pang, Yongjun Xu, Zhengwen Huang:
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation. 1077-1084 - Mortaza Nikzad, Kamal Jamshidi, Ali Bohlooli, Faiz Mohammad Faqiry:
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm. 1085-1093 - Cüneyt Bayilmis, M. Ali Ebleme, Ünal Çavusoglu, Kerem Küçük, Abdullah Sevin:
A survey on communication protocols and performance evaluations for Internet of Things. 1094-1104 - Keju Lu, Fahui Wu, Lin Xiao, Yipeng Liang, Dingcheng Yang:
Sum-rate maximization for UAV-enabled two-way relay systems. 1105-1114 - Qing Xue, Gang Feng:
A robust beam tracking scheme for millimeter wave HetNets. 1115-1121 - Mohammad Haseeb Zafar, Imran Khan, Madini O. Alassafi:
An efficient resource optimization scheme for D2D communication. 1122-1129
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.