default search action
Digital Communications and Networks, Volume 9
Volume 9, Number 1, February 2023
- Shahid Mumtaz, Gautam Srivastava, Wei Wei:
Special issue on machine learning-driven big data and blockchain techniques for communication. 1-2 - Chunying Zhang, Jing Ren, Lu Liu, Shouyue Liu, Xiaoqi Li, Liya Wang:
Set pair three-way overlapping community discovery algorithm for weighted social internet of things. 3-13 - Pengcheng Wei, Bo Wang, Xiaojun Dai, Li Li, Fangcheng He:
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder. 14-21 - Hongfei Zhang, Li Zhu, Tao Dai, Liwen Zhang, Xi Feng, Li Zhang, Kaiqi Zhang:
Smart object recommendation based on topic learning and joint features in the social internet of things. 22-32 - Ashwin Verma, Pronaya Bhattacharya, Umesh Bodkhe, Deepti Saraswat, Sudeep Tanwar, Kapal Dev:
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment. 33-46 - Baofeng Ji, Mingkun Zhang, Ling Xing, Xiaoli Li, Chunguo Li, Congzheng Han, Hong Wen:
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract. 47-55 - Wanneng Shu, Li Yang:
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks. 56-66 - Aimin Yang, Chaomeng Lu, Jie Li, Xiangdong Huang, Tianhao Ji, Xichang Li, Yichao Sheng:
Application of meta-learning in cyberspace security: a survey. 67-78 - Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions. 79-89 - Luo Xianquan, Chunjiong Zhang, Longju Bai:
A fixed clustering protocol based on random relay strategy for EHWSN. 90-100 - Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour:
An ensemble deep learning model for cyber threat hunting in industrial internet of things. 101-110 - Haifeng Lin, Qilin Xue, Jiayin Feng, Di Bai:
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. 111-124 - Debasmita Mishra, Bighnaraj Naik, Janmenjoy Nayak, Alireza Souri, Pandit Byomakesha Dash, S. Vimal:
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network. 125-137 - Yueshen Xu, Zhiying Wang, Honghao Gao, Zhiping Jiang, Yuyu Yin, Rui Li:
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things. 138-145 - Aimin Yang, Zezhong Ma, Chunying Zhang, Yang Han, Zhibin Hu, Wei Zhang, Xiangdong Huang, Yafeng Wu:
Review on application progress of federated learning model and security hazard protection. 146-158
- Xiaoling Huang, Youxia Dong, Guodong Ye, Wun-She Yap, Bok-Min Goi:
Visually meaningful image encryption algorithm based on digital signature. 159-165 - Milan Groshev, Gabriele Baldoni, Luca Cominardi, Antonio de la Oliva, Robert Gazda:
Edge robotics: are we ready? an experimental evaluation of current vision and future directions. 166-174 - Ennio Gambi, Linda Senigagliesi, Andrea Barbaresi, Matteo Mellini, Adelmo De Santis:
A WKNN-based approach for NB-IoT sensors localization. 175-182 - Ioanna Roussaki, Kevin Doolin, Antonio F. Skarmeta, George Routis, Juan Antonio López-Morales, Ethel Claffey, Manuel Mora, Juan Antonio Martínez:
Building an interoperable space for smart agriculture. 183-193 - Francesco Buccafurri, Gianluca Lax, Lorenzo Musarella, Antonia Russo:
An Ethereum-based solution for energy trading in smart grids. 194-202 - Xiaonan Wang, Xilan Chen, Xingwei Wang:
Secure vehicular data communication in Named Data Networking. 203-210 - Heba Saleous, Muhusina Ismail, Saleh H. Aldaajeh, Nisha Madathil, Saed Alrabaee, Kim-Kwang Raymond Choo, Nabeel Al-Qirim:
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. 211-222 - Denzil Furtado, André F. Gygax, Chien Aun Chan, Ashley I. Bush:
Time to forge ahead: The Internet of Things for healthcare. 223-235 - Hamid Taramit, Luis Orozco-Barbosa, Abdelkrim Haqiq:
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism. 236-251 - Abuzar B. M. Adam, Xiaoyu Wan, Zhengqiang Wang:
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems. 252-263 - Wali Ullah Khan, Furqan Jameel, Asim Ihsan, Omer Waqar, Manzoor Ahmed:
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks. 264-269 - Jesús Sánchez Gómez, Rafael Marín-Pérez, Ramon Sanchez-Iborra, Miguel Angel Zamora:
MEC-based architecture for interoperable and trustworthy internet of moving things. 270-279 - Rui Liu, Jianping Pan:
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring. 280-291
Volume 9, Number 2, April 2023
- Fazlullah Khan, Joel J. P. C. Rodrigues, Mian Ahmad Jan:
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications. 293-295 - Jing Zhang, Qichen Yan, Xiaogang Zhu, Keping Yu:
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine. 296-305 - Han Wang, Fida Hussain Memon, Xianpeng Wang, Xingwang Li, Ning Zhao, Kapal Dev:
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach. 306-312 - YeEun Kim, Junggab Son, Reza M. Parizi, Gautam Srivastava, Heekuck Oh:
3-Multi ranked encryption with enhanced security in cloud computing. 313-326 - Xiang Wu, Huanhuan Wang, Yongting Zhang, Ruirui Li:
A secure visual framework for multi-index protection evaluation in networks. 327-336 - Weizheng Wang, Huakun Huang, Zhimeng Yin, Thippa Reddy Gadekallu, Mamoun Alazab, Chunhua Su:
Smart contract token-based privacy-preserving access control system for industrial Internet of Things. 337-346 - Jun Liu, Kai Qian, Zhibao Qin, Mohammad Dahman Alshehri, Qiong Li, Yonghang Tai:
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access. 347-357 - Chintan Patel, Ali Kashif Bashir, Ahmad Ali AlZubi, Rutvij H. Jhaveri:
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element. 358-366 - Qusay Medhat Salih, Md. Arafatur Rahman, A. Taufiq Asyhari, Muhammad Kamran Naeem, Mohammad N. Patwary, Ryan Alturki, Mohammed Abdulaziz Ikram:
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications. 367-382 - Bello Musa Yakubu, Majid Iqbal Khan, Abid Khan, Farhana Jabeen, Gwanggil Jeon:
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. 383-392 - Saeid Yazdanpanah, Saman Shojae Chaeikar, Alireza Jolfaei:
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare. 393-399 - Lingwei Xu, Hao Yin, Hong Jia, Wenzhong Lin, Xinpeng Zhou, Yong Fu, Xu Yu:
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks. 400-410 - Anichur Rahman, Md. Jahidul Islam, Shahab S. Band, Ghulam Muhammad, Kamrul Hasan, Prayag Tiwari:
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. 411-421 - Nilesh Kumar Jadav, Riya Kakkar, Harsh Mankodiya, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma:
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G. 422-435 - Bahar Farahani, Amin Karimi Monsefi:
Smart and collaborative industrial IoT: A federated learning and data space approach. 436-447
- Jianhui Lv, Yuhui Shi, Hui Cheng, Zhiwei Lin, Lianbo Ma:
Guest editorial: AI and edge computing driven technologies and applications. 448-449 - Kuanishbay Sadatdiynov, Laizhong Cui, Lei Zhang, Joshua Zhexue Huang, Salman Salloum, Mohammad Sultan Mahmud:
A review of optimization methods for computation offloading in edge computing networks. 450-461 - Qing Li, He Huang, Yong Jiang, Jingpu Duan:
AdaptNF: Adaptive service chain scheduling with stateless migration and NF consolidation. 462-472 - Jiabao Wen, Jiachen Yang, Tianying Wang, Yang Li, Zhihan Lv:
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing. 473-482 - Ziqiao Wang, Xiaomu Cai:
Teaching mechanism empowered by virtual simulation: Edge computing-driven approach. 483-491 - Jie Li, Zhiping Yang, Xingwei Wang, Yichao Xia, Shijian Ni:
Task offloading mechanism based on federated reinforcement learning in mobile edge computing. 492-504 - Yumin Shen, Hongyu Guo:
Research on high-performance English translation based on topic model. 505-511
- Zhao Li, Pintian Lyu, Jun Li, Zhixian Chang, Jia Liu, Zheng Yan:
SCIM: Incorporating secure communication and interference management in one operation. 512-522 - Yunpeng Zhang, Luliang Jia, Nan Qi, Yifan Xu, Meng Wang:
Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach. 523-533 - Amin Jamali, Mehdi Berenjkoub, Hossein Saidi, Behrouz Shahgholi Ghahfarokhi:
Survivability evaluation for networks carrying complex traffic flows. 534-544 - Ruyan Wang, Chunyan Zang, Peng He, Yaping Cui, Dapeng Wu:
Auction-based profit maximization offloading in mobile edge computing. 545-556 - Souleymane Berthe, Xiaorong Jing, Hongqing Liu, Qianbin Chen:
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems. 557-566 - Chengcai Wang, Ao Wu, Yueqi Hou, Xiaolong Liang, Luo Xu, Xiaomo Wang:
Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms. 567-579 - Xiaoge Huang, Zhi Chen, Qianbin Chen, Jie Zhang:
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks. 580-589 - Hongcheng Huang, Peixin Ye, Min Hu, Jun Wu:
A multi-point collaborative DDoS defense mechanism for IIoT environment. 590-601
- Qing Xue, Gang Feng:
Erratum to "A robust beam tracking scheme for millimeter wave HetNets" [Digit. Commun. Network. 8 (6) (2022) 1115-1121]. 602
Volume 9, Number 3, June 2023
- Peng Zheng, Jianwen Ding, Dan Fei, Jiayi Zhang, Bo Ai, Xiao Li, Shi Jin, Tiejun Cui:
Field trial measurement and channel modeling for reconfigurable intelligent surface. 603-612 - Guang Chen, Yueyun Chen, Zhiyuan Mai, Conghui Hao, Meijie Yang, Shuangshuang Han, Liping Du:
Joint multiple resource allocation for offloading cost minimization in IRS-assisted MEC networks with NOMA. 613-627 - Xiaoting Ma, Junhui Zhao, Jieyu Liao, Ziyang Zhang:
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks. 628-637 - Wenwan Xu, Jun Zhang, Shu Cai, Jue Wang, Yi Wu:
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI. 638-644 - Zining Wang, Min Lin, Shupei Huang, Ming Cheng, Wei-Ping Zhu, Yan Guo:
Robust beamforming for IRS-aided SWIPT in cognitive radio networks. 645-654 - Peixu Liu, Gang Jing, Hongwu Liu, Liang Yang, Theodoros A. Tsiftsis:
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems. 655-666 - Ziyang Lu, Yubin Zhao, Xiaofan Li:
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer. 667-676
- Leonardo Bertolin Furstenau, Yan Pablo Reckziegel Rodrigues, Michele Kremer Sott, Pedro Leivas, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo:
Internet of things: Conceptual network structure, main challenges and future directions. 677-687 - Zhuo Chen, Peihong Wei, Yan Li:
Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud. 688-697 - Weidong Yang, Erbo Shen, Xuyu Wang, Shiwen Mao, Yuehong Gong, Pengming Hu:
Wi-Wheat+: Contact-free wheat moisture sensing with commodity WiFi based on entropy. 698-709 - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei:
Secure ticket-based authentication method for IoT applications. 710-716 - Junjie Ding, Yuxuan Tan, Yanyi Wang, Jiao Zhang, Menghui He, Feng Zhao, Li Zhao, Wen Zhou, Yiwei Shi, Min Zhu, Jianjun Yu:
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber. 717-722 - Tongyu Song, Xuebin Tan, Jing Ren, Wenyu Hu, Sheng Wang, Shizhong Xu, Xiong Wang, Gang Sun, Hongfang Yu:
DRAM: A DRL-based resource allocation scheme for MAR in MEC. 723-733 - Zhixin Liu, Jiawei Su, Yuanai Xie, Yazhou Yuan, Yi Yang, Xinping Guan:
Distributed robust power control in two-tier vehicle networks under uncertain channel environments. 734-742 - Keliang Du, Luhan Wang, Xiangming Wen, Yu Liu, Haiwen Niu, Shaoxin Huang:
ML-SLD: A message-level stateless design for cloud-native 5G core network. 743-756 - Yangpeng Dan, Jianxin Yi, Xianrong Wan, Yunhua Rao, Yan Liu:
A robust symbol timing strategy for cellular systems. 757-768 - Ao Li, Taihai Yang, Wenxin Wu, Lei Luo:
Soft transmission of 3D video for low power and low complexity scenario. 769-778 - Weimin Kang:
Nonbinary ldpc-coded probabilistic shaping scheme for MIMO systems based on signal space diversity. 779-787 - Miaona Huang, Jun Chen:
A novel proactive soft load balancing framework for ultra dense network. 788-796 - Pengfei Du, Hongjiang Lei, Imran Shafique Ansari, Jianbo Du, Xiaoli Chu:
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks. 797-808
Volume 9, Number 4, August 2023
- Lupeng Zhang, Pingchuan Wang, Yuming Zhang, Zongzheng Chi, Ning Tong, Lei Wang, Fengqi Li:
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT. 809-816 - Ye Zhu, Zhiqiang Liu, Peng Wang, Chenglie Du:
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G. 817-826 - Jianlong Zhang, Guangzu Fang, Bin Wang, Xiaobo Zhou, Qingqi Pei, Chen Chen:
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network. 827-835 - Siguang Chen, Bei Tang, Kun Wang:
Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT. 836-845 - Junlin Zhang, Mingqian Liu, Nan Zhao, Yunfei Chen, Qinghai Yang, Zhiguo Ding:
Spectrum and energy efficient multi-antenna spectrum sensing for green UAV communication. 846-855
- Leonardo Bertolin Furstenau, Pedro Leivas, Michele Kremer Sott, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo:
Big data in healthcare: Conceptual network structure, key challenges and opportunities. 856-868 - Jalaluddin Qureshi, Chuan Heng Foh:
Triangular code: Near-optimal linear time fountain code. 869-878 - Adel Aldalbahi, Nazli Siasi, Asim Mazin, Mohammed A. Jasim:
Digital compass for multi-user beam access in mmWave cellular networks. 879-886 - Yuwen Liu, Rongju Yao, Song Jia, Fan Wang, Ruili Wang, Rui Ma, Lianyong Qi:
A label noise filtering and label missing supplement framework based on game theory. 887-895 - Entong Meng, Xiangyuan Bu, Jihong Yu, Jianping An, Xuanhe Yang:
Robust or nonrobust: On MC-DS-CDMA acquisition in LEO satellite communications. 896-905 - Yizhou Shen, Shigen Shen, Qi Li, Haiping Zhou, Zongda Wu, Youyang Qu:
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. 906-919 - Yingzhe Luo, Jianhao Hu:
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system. 920-930 - Linlin Feng, Zhizhong Zhang, Haonan Hu, Errong Pei:
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process. 931-940 - Gabriel Francisco Lorençon Ribeiro Bernardes, Rogério Ishibashi, André A. S. Ivo, Valério Rosset, Bruno Yuji Lino Kimura:
Prototyping low-cost automatic weather stations for natural disaster monitoring. 941-956 - Shi Dong, Yuanjun Xia:
Network traffic identification in packet sampling environment. 957-970 - Tianci Zhang, Junjie Zhou, Zhengchuan Chen, Zhong Tian, Wanli Wen, Yunjian Jia:
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation. 971-980 - Jiale Zhang, Yue Liu, Di Wu, Shuai Lou, Bing Chen, Shui Yu:
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems. 981-989 - Duo Wu, Lin Cui:
A comprehensive survey on Segment Routing Traffic Engineering. 990-1008 - Peppino Fazio, Miralem Mehic, Miroslav Voznák:
Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view. 1009-1022 - Yuchao Zhu, Shaowei Wang:
Traffic prediction enabled dynamic access points switching for energy saving in dense networks. 1023-1031
Volume 9, Number 5, October 2023
- Muhammad Ali Naeem, Yousaf Bin Zikria, Rashid Ali, Usman Tariq, Yahui Meng, Ali Kashif Bashir:
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective. 1033-1052 - Yilei Wang, Zhaojie Wang, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen, Minghao Zhao:
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems. 1053-1060 - Yang Li, Jiachen Yang, Jiabao Wen:
Entropy-based redundancy analysis and information screening. 1061-1069 - Zhenjiang Qian, Rui Xia, Gaofei Sun, Xiaoshuang Xing, Kaijian Xia:
A measurable refinement method of design and verification for micro-kernel operating systems in communication network. 1070-1079 - Neha Garg, Rajat Petwal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
On the design of an AI-driven secure communication scheme for internet of medical things environment. 1080-1089 - Tun Li, Yanbing Liu, Qilie Liu, Wei Xu, Yunpeng Xiao, Hong Liu:
A malware propagation prediction model based on representation learning and graph convolutional networks. 1090-1100 - Xiancui Xiao, Xiangwei Zheng, Ji Bian, Cun Ji, Xinchun Cui:
A dynamic and resource sharing virtual network mapping algorithm. 1101-1112 - Tejasvi Alladi, Varun Kohli, Vinay Chamola, F. Richard Yu:
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. 1113-1122 - Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi:
Accurate threat hunting in industrial internet of things edge devices. 1123-1130 - Tehsin Kanwal, Hasina Attaullah, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. 1131-1140 - Xia Lei, Yongkai Fan, Xiong-Lin Luo:
On fine-grained visual explanation in convolutional neural networks. 1141-1147
- Qasim Jan, Shahid Hussain, Zhiwen Pan, Nan Liu, Zakir Ali, Zechen Liu, Xiaohu You:
Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes. 1148-1156 - Qiang Wang, Hao Jiang, Ying Jiang, Shuwen Yi, Qi Nie, Geng Zhang:
Multiplex network infomax: Multiplex network embedding via information fusion. 1157-1168 - Guangquan Xu, Wenyu Dong, Jun Xing, Wenqing Lei, Jian Liu, Lixiao Gong, Meiqi Feng, James Xi Zheng, Shaoying Liu:
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection. 1169-1179 - Xin Liu, Liang Zheng, Sumi Helal, Weishan Zhang, Chunfu Jia, Jiehan Zhou:
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs. 1180-1189 - Anqi Meng, Guandong Wei, Yao Zhao, Xiaozheng Gao, Zhanxin Yang:
Green resource allocation for mobile edge computing. 1190-1199 - Bin Cao, Tingyong Wu, Xiang Bai:
Stochastic programming based multi-arm bandit offloading strategy for internet of things. 1200-1211 - Junwei Wang, Xianglin Wei, Jianhua Fan, Qiang Duan, Jianwei Liu, Yangang Wang:
Request pattern change-based cache pollution attack detection and defense in edge computing. 1212-1220 - Weishan Zhang, Xiao Chen, Ke He, Leiming Chen, Liang Xu, Xiao Wang, Su Yang:
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting. 1221-1229 - Jingyuan Duan, Ling Tian, Jianqiao Mao, Jiaxin Li:
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions. 1230-1241
Volume 9, Number 6, December 2023
- Weiwei Jiang:
Software defined satellite networks: A survey. 1243-1264 - Homayun Kabir, Mau-Luen Tham, Yoong Choon Chang:
Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions. 1265-1290 - Jienan Chen, Jiyun Tao, Siyu Luo, Shuai Li, Chuan Zhang, Wei Xiang:
A deep learning driven hybrid beamforming method for millimeter wave MIMO system. 1291-1300 - Alex Medeiros de Araújo, Anderson Bergamini de Neira, Michele Nogueira:
Autonomous machine learning for early bot detection in the internet of things. 1301-1309 - Shumei Liu, Yao Yu, Lei Guo, Phee Lep Yeoh, Branka Vucetic, Yonghui Li:
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks. 1310-1318 - Hui-Ping Yin, Chao Bai, Haipeng Ren:
Echo state network based symbol detection in chaotic baseband wireless communication. 1319-1330 - Shuo Yuan, Mugen Peng, Yaohua Sun, Xiqing Liu:
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges. 1331-1339 - Mihailo Vesovic, Aleksandra Smiljanic, Dusan Kostic:
Fast and scalable routing protocols for data center networks. 1340-1350 - Jinfang Jiang, Chuan Lin, Guangjie Han, Adnan M. Abu-Mahfouz, Syed Bilal Hussain Shah, Miguel Martínez-García:
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities. 1351-1362 - Shahriar Kaisar, Joarder Kamruzzaman, Gour C. Karmakar, Md. Mamunur Rashid:
Decentralized content sharing in mobile ad-hoc networks: A survey. 1363-1398 - Shuang Liu, Jie Tian, Chao Zhai, Tiantian Li:
Joint computation offloading and resource allocation in vehicular edge computing networks. 1399-1410 - Yajie He, Chonghui Xiao, Shuai Wang, Yun-Hao Liu, Zhaoyuan Xu, Haoquan Zhou, Min Zhao, Wei Gong:
Smart all-time vision: The battery-free video communication for urban administration and law enforcement. 1411-1420 - Chu Chu, Guangjun Wen, Jianyu Niu:
Efficient and robust missing key tag identification for large-scale RFID systems. 1421-1433 - Zezhou Luo, Hongcheng Zhuang:
A novel fractional uplink power control framework for self-organizing networks. 1434-1440 - Chenquan Gan, Jinhui Yao, Shuaiying Ma, Zufan Zhang, Lianxiang Zhu:
The deep spatiotemporal network with dual-flow fusion for video-oriented facial expression recognition. 1441-1447 - Haohao Wang, Mengmeng Sun, Lianming Zhang, Pingping Dong, Yehua Wei, Jing Mei:
Scheduling optimization for upstream dataflows in edge computing. 1448-1457 - Hemant Kumar Narsani, Ali Ranjha, Kapal Dev, Fida Hussain Memon, Nawab Muhammad Faseeh Qureshi:
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems. 1458-1464 - Long Zhang, Bin Cao, Gang Feng:
Opportunistic admission and resource allocation for slicing enhanced IoT networks. 1465-1476 - Chuhuan Liu, Yi Zhang, Guohang Niu, Luliang Jia, Liang Xiao, Jiangxia Luan:
Towards reinforcement learning in UAV relay for anti-jamming maritime communications. 1477-1485 - Abel Efetobor Edje, Shaffie Muhammad Abd Latiff, Weng Howe Chan:
IoT data analytic algorithms on edge-cloud infrastructure: A review. 1486-1515
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.