


default search action
Digital Communications and Networks, Volume 10
Volume 10, Number 1, 2024
- Jiachen Yang, Yiwen Sun

, Yutian Lei, Zhuo Zhang, Yang Li
, Yongjun Bao, Zhihan Lv
:
Reinforcement learning based edge computing in B5G. 1-6 - Mingzi Chen, Xin Wei, Peizhong Xie, Zhe Zhang

:
QoE oriented intelligent online learning evaluation technology in B5G scenario. 7-15 - Xue-Yong Yu, Wen-Jin Niu, Ye Zhu, Hong-Bo Zhu:

UAV-assisted cooperative offloading energy efficiency system for mobile edge computing. 16-24 - Daosen Zhai

, Huan Li
, Xiao Tang
, Ruonan Zhang, Haotong Cao:
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks. 25-37 - Mianjie Li

, Senfeng Lai, Jiao Wang, Zhihong Tian, Nadra Guizani, Xiaojiang Du, Chun Shan:
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications. 38-44 - Pei Li

, Lingyi Wang
, Wei Wu, Fuhui Zhou, Baoyun Wang, Qihui Wu:
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks. 45-52 - Zhipeng Cheng

, Minghui Liwang
, Ning Chen
, Lianfen Huang, Nadra Guizani, Xiaojiang Du:
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks. 53-62 - Yan Wu

, Chao Yue, Yang Yang, Liang Ao:
Resource allocation for D2D-assisted haptic communications. 63-74 - Ruochen Huang

, Wei Feng
, Shan Lu, Tao Shan, Changwei Zhang, Yun Liu:
An artificial intelligence diabetes management architecture based on 5G. 75-82 - Jiajia Guo, Tong Chen, Shi Jin, Geoffrey Ye Li, Xin Wang, Xiaolin Hou

:
Deep learning for joint channel estimation and feedback in massive MIMO systems. 83-93 - Chan-Yeob Park, Ji-Sung Jung, Yeong-Rong Lee, Beom-Sik Shin, Hyoung-Kyu Song:

Intelligent reflecting surface for sum rate enhancement in MIMO systems. 94-100 - Haie Dou, Lei Wang

, Bin Kang, Baoyu Zheng:
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case. 101-108 - Xiaoming He, Yingchi Mao, Yinqiu Liu, Ping Ping, Yan Hong, Han Hu:

Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks. 109-116 - Jun Cai, Chuan Yin, Youwei Ding:

Optimization of resource allocation in FDD massive MIMO systems. 117-125 - Naiyu Wang, Wenti Yang, Xiaodong Wang

, Longfei Wu, Zhitao Guan
, Xiaojiang Du, Mohsen Guizani:
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. 126-134 - Tong Ding

, Lei Liu, Yi Zhu, Lizhen Cui, Zhongmin Yan:
IoV environment exploring coordination: A federated learning approach. 135-141 - Kui Zhu, Yongjun Ren, Jian Shen, Pandi Vijayakumar

, Pradip Kumar Sharma
:
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs. 142-149 - Zhe Wang

, Xinhang Li
, Tianhao Wu
, Chen Xu, Lin Zhang:
A credibility-aware swarm-federated deep learning framework in internet of vehicles. 150-157 - Abdul Wahid

, Mounira Msahli, Albert Bifet
, Gérard Memmi:
NFA: A neural factorization autoencoder based online telephony fraud detection. 158-167 - Luying Wang, Lingyi Chen, Neal N. Xiong

, Anfeng Liu
, Tian Wang, Mianxiong Dong:
An intelligent active probing and trace-back scheme for IoT anomaly detection. 168-181 - Mohiuddin Ahmed

, A. N. M. Bazlur Rashid
:
EDSUCh: A robust ensemble data summarization method for effective medical diagnosis. 182-189 - Farhan Ullah

, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. 190-204 - Mohanad Sarhan

, Siamak Layeghy
, Nour Moustafa, Marcus Gallagher
, Marius Portmann
:
Feature extraction for machine learning-based intrusion detection in IoT networks. 205-216 - Yong Li, Rui Liu, Xianlong Jiao, Youqiang Hu, Zhen Luo

, Francis C. M. Lau:
Doped low-density parity-check codes. 217-226 - Shaopeng Guan

, Conghui Zhang
, Yilin Wang, Wenqing Liu:
Hadoop-based secure storage solution for big data in cloud computing environment. 227-236
Volume 10, Number 2, 2024
- Jiajie Guo

, Muhammad Bilal
, Yuying Qiu, Cheng Qian, Xiaolong Xu, Kim-Kwang Raymond Choo:
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities. 237-247 - Kangde Liu

, Zheng Yan, Xueqin Liang
, Raimo Kantola, Chuangyue Hu:
A survey on blockchain-enabled federated learning and its prospects with digital twin. 248-264 - Yuling Chen

, Xiong Yang
, Tao Li
, Yi Ren
, Yangyang Long
:
A blockchain-empowered authentication scheme for worm detection in wireless sensor network. 265-272 - Wenyi Tang

, Ling Tian, Xu Zheng, Ke Yan:
Analyzing topics in social media for improving digital twinning based product development. 273-281 - Jiachen Yang, Meng Xi

, Jiabao Wen
, Yang Li
, Houbing Herbert Song
:
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing. 282-291 - Yuteng Xiao

, Kaijian Xia, Hongsheng Yin
, Yu-Dong Zhang, Zhenjiang Qian
, Zhaoyang Liu
, Yuehan Liang, Xiaodan Li
:
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network. 292-303 - Zhenjiang Qian

, Gaofei Sun, Xiaoshuang Xing, Gaurav Dhiman:
Refinement modeling and verification of secure operating systems for communication in digital twins. 304-314 - Davide Calandra

, Filippo Gabriele Pratticò
, Alberto Cannavò, Claudio Casetti
, Fabrizio Lamberti
:
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective. 315-327 - Bo Yi, Jianhui Lv, Xingwei Wang, Lianbo Ma, Min Huang:

Digital twin driven and intelligence enabled content delivery in end-edge-cloud collaborative 5G networks. 328-336 - Tianzhe Zhou, Xuguang Zhang

, Bing Kang, Mingkai Chen
:
Multimodal fusion recognition for digital twin. 337-346 - Hikmat Adhami, Mohammad Al Ja'afreh

, Mohamad Hoda, Jiaqi Zhao, Yong Zhou, Abdulmotaleb El Saddik
:
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A. 347-354 - Yange Chen, Baocang Wang

, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. 355-368 - Héber Hwang Arcolezi

, Jean-François Couchot
, Bechara al Bouna, Xiaokui Xiao:
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates. 369-379 - Renwan Bi

, Mingfeng Zhao, Zuobin Ying
, Youliang Tian, Jinbo Xiong:
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT. 380-388 - Lihua Yin, Sixin Lin, Zhe Sun

, Ran Li, Yuanyuan He
, Zhiqiang Hao:
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy. 389-403 - Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Imran Razzak

, Mohamed Abd Elfattah:
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach. 404-415 - Silv Wang

, Kai Fan
, Kuan Zhang, Hui Li, Yintang Yang:
Data complexity-based batch sanitization method against poison in distributed learning. 416-428 - Zhao Li

, Xiujuan Liang, Yinghou Liu, Jia Liu
, Zheng Yan:
Joint alignment and steering to manage interference. 429-438 - Chaopeng Guo

, Zhaojin Zhong, Zexin Zhang, Jie Song
:
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT. 439-449 - Zhidu Li

, Fuxiang Li, Tong Tang, Hong Zhang
, Jin Yang:
Video caching and scheduling with edge cooperation. 450-460 - Sherzod Elamanov, Hyeonseo Son, Bob Flynn, Seong Ki Yoo

, Naqqash Dilshad
, Jaeseung Song
:
Interworking between Modbus and internet of things platform for industrial services. 461-471 - Qingxia Liu, Bang Wang, Jiming Qi, Xianjun Deng:

A new centrality measure based on neighbor loop structure for network dismantling. 472-480 - Sheng Hao, Huyin Zhang, Fei Yang

, Chenghao Li, Jing Wang:
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks: Design and analysis. 481-497 - Zhenkun Jin, Yixuan Geng

, Chenlu Zhu
, Yunzhi Xia, Xianjun Deng, Lingzhi Yi, Xianlan Wang:
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network. 498-508
Volume 10, Number 3, 2024
- Yichi Zhang, Haitao Zhao, Kuo Cao, Li Zhou

, Zhe Wang, Yueling Liu, Jibo Wei:
A highly reliable encoding and decoding communication framework based on semantic information. 509-518 - Jiale Wu, Celimuge Wu

, Yangfei Lin, Tsutomu Yoshinaga
, Lei Zhong
, Xianfu Chen
, Yusheng Ji:
Semantic segmentation-based semantic communication system for image transmission. 519-527 - Yating Liu

, Xiaojie Wang, Zhaolong Ning, Mengchu Zhou, Lei Guo, Behrouz Jedari:
A survey on semantic communications: Technologies, solutions, applications and challenges. 528-545 - Lu Sun, Xiaona Li, Mingyue Zhang, Liangtian Wan

, Yun Lin
, Xianpeng Wang
, Gang Xu
:
Multi-layer network embedding on scc-based network with motif. 546-556 - Rong Ma

, Zhen Zhang, Yide Ma, Xiping Hu, Edith C. H. Ngai, Victor C. M. Leung:
An improved pulse coupled neural networks model for semantic IoT. 557-567 - Yueling Liu

, Shengteng Jiang, Yichi Zhang
, Kuo Cao, Li Zhou, Boon-Chong Seet
, Haitao Zhao, Jibo Wei:
Extended context-based semantic communication system for text transmission. 568-576 - Yongfeng Tao, Minqiang Yang, Yushan Wu, Kevin Lee, Adrienne S. Kline

, Bin Hu:
Depressive semantic awareness from vlog facial and vocal streams via spatio-temporal transformer. 577-585 - Xin Li, Xinghua Lei, Xiuwen Liu, Hang Xiao

:
Collision-free parking recommendation based on multi-agent reinforcement learning in vehicular crowdsensing. 609-619 - Guanlin Wu

, Haipeng Wang, Yu Liu, You He:
GraphSTGAN: Situation understanding network of slow-fast high maneuvering targets for maritime monitor services of IoT data. 620-630 - Zhaowei Liu

, Dong Yang
, Shenqiang Wang
, Hang Su:
Adaptive multi-channel Bayesian graph attention network for IoT transaction security. 631-644 - Xu Li

, Gwanggil Jeon, Wenshuo Wang, Jindong Zhao:
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing. 645-654 - Yaguang Lin, Xiaoming Wang, Liang Wang

, Pengfei Wan
:
Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things. 655-665 - Lizong Zhang

, Yiming Wang, Ke Yan
, Yi Su, Nawaf Alharbe
, Shuxin Feng:
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things. 666-675 - Ahmad Azab, Mahmoud Khasawneh

, Saed Alrabaee
, Kim-Kwang Raymond Choo
, Maysa Sarsour:
Network traffic classification: Techniques, datasets, and challenges. 676-692 - Mian Guo

, Mithun Mukherjee
, Jaime Lloret
, Lei Li, Quansheng Guan, Fei Ji:
Joint computation offloading and parallel scheduling to maximize delay-guarantee in cooperative MEC systems. 693-705 - Shengyu Zhang, Xiaoqian Li

, Kwan Lawrence Yeung:
Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations. 706-715 - Muralitharan Krishnan

, Yongdo Lim, Seethalakshmi Perumal, Gayathri Palanisamy
:
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach. 716-727 - Yu Zhang

, Bei Gong, Qian Wang:
BLS-identification: A device fingerprint classification mechanism based on broad learning for Internet of Things. 728-739 - Zhimin Zhang

, Huansheng Ning
, Fadi Farha
, Jianguo Ding
, Kim-Kwang Raymond Choo:
Artificial intelligence in physiological characteristics recognition for internet of things authentication. 740-755 - Qiao Tian

, Sicheng Zhang, Shiwen Mao
, Yun Lin
:
Adversarial attacks and defenses for digital communication signals identification. 756-764 - Silvana Trindade, Luiz F. Bittencourt

, Nelson L. S. da Fonseca
:
Resource management at the network edge for federated learning. 765-782 - Sabuzima Nayak

, Ripon Patgiri
, Lilapati Waikhom, Arif Ahmed:
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications. 783-804 - Jie Chen

, Jianhua Tang
:
UAV-assisted data collection for wireless sensor networks with dynamic working modes. 805-812 - Hui Xia, Ning Huang, Xue-cai Feng, Rui Zhang, Chao Liu

:
Starlet: Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT. 586-596
Volume 10, Number 4, 2024
- Shasha Tian, Yuanxiang Li, Xiao Zhang

, Lu Zheng, Linhui Cheng, Wei She, Wei Xie:
Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG. 813-826 - Jianhang Tang

, Guoquan Wu
, Mohammad M. Jalalzai
, Lin Wang, Bing Zhang, Yi Zhou:
Energy-optimal DNN model placement in UAV-enabled edge computing networks. 827-836 - Jing Bai, Jinsong Gui, Guosheng Huang, Shaobo Zhang, Anfeng Liu

:
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing. 837-852 - Tao Huang

, Renchao Xie, Yuzheng Ren
, F. Richard Yu, Zhuang Zou
, Lu Han, Yunjie Liu, Demin Cheng, Yinan Li, Tian Liu:
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet. 853-862 - Yawen Tan

, Jiadai Wang
, Jiajia Liu:
Strengthening network slicing for Industrial Internet with deep reinforcement learning. 863-872 - Linpei Li

, Chunlei Sun, Jiahao Huo, Yu Su, Lei Sun, Yao Huang, Ning Wang, Haijun Zhang:
Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities. 873-883 - Cheng Chi, Yang Liu, Baoluo Ma, Senchun Chai, Puning Zhang, Zihang Yin:

A compatible carbon efficiency information service framework based on the industrial internet identification. 884-894 - Nan Jia

, Shaojing Fu, Guangquan Xu, Kai Huang, Ming Xu:
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices. 895-903 - Arif Ullah, Ziaul Haq Abbas, Ghulam Abbas

, Fazal Muhammad
, Jae-Mo Kang:
Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment. 904-917 - Md. Forkan Uddin

:
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing. 918-933 - Yunhao Jiang

, Siqi Liu, Minyang Li, Nan Zhao
, Minghu Wu:
A new adaptive co-site broadband interference cancellation method with auxiliary channel. 934-947 - Yezeng Wu, Lixia Xiao

, Yiming Xie, Guanghua Liu, Tao Jiang
:
Efficient signal detector design for OTFS with index modulation. 948-955 - Bohao Cao

, Zheng Xiang, Peng Ren, Qiao Li
, Baoyi Xu
:
Downlink network-coded multiple access with diverse power. 956-964 - Huifang Yu

, Qi Zhang:
Certificateless threshold signature from lattice. 965-972 - Yourong Chen

, Hao Chen, Zhenyu Xiong, Banteng Liu, Zhangquan Wang, Meng Han
:
Game theory attack pricing for mining pools in blockchain-based IoT. 973-988 - Kumar Sekhar Roy

, Subhrajyoti Deb, Hemanta Kumar Kalita:
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. 989-1000 - Chi-Bao Le

, Dinh-Thuan Do, Miroslav Voznák:
Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper. 1001-1013 - Xuefei Zhang

, Junjie Liu, Yijing Li, Qimei Cui, Xiaofeng Tao
, Ren Ping Liu
, Wenzheng Li:
Vehicle-oriented ridesharing package delivery in blockchain system. 1014-1023 - Xiaodong Zhuang

, Xiangrong Tong:
A dynamic algorithm for trust inference based on double DQN in the internet of things. 1024-1034 - Yuanni Liu

, Ling Pan, Shanzhi Chen:
A hierarchical blockchain-enabled security-threat assessment architecture for IoV. 1035-1047 - Arslan Khalid

, Prapun Suksompong
:
Application of maximum rank distance codes in designing of STBC-OFDM system for next-generation wireless communications. 1048-1056 - Wenjie Liang

, Chengxiang Li, Lin Cui
, Fung Po Tso
:
Position-aware packet loss optimization on service function chain placement. 1057-1067 - Hailin Feng, Dongliang Chen, Haibin Lv, Zhihan Lv

:
Game theory in network security for digital twins in industry. 1068-1078 - Ankita A. Mahamune, M. M. Chandane:

Trust-based co-operative routing for secure communication in mobile ad hoc networks. 1079-1087 - Muhammad Rashid Ramzan

, Muhammad Naeem, Omer Chughtai
, Waleed Ejaz
, Muhammad Altaf
:
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach. 1088-1102 - Jianguo Sun, Wenshan Wang

, Sizhao Li
, Qingan Da, Lei Chen:
Scheduling optimization for UAV communication coverage using virtual force-based PSO model. 1103-1112 - Jiao Mao, Guoliang Xu, Lijun He

, Jiangtao Luo
:
Attention-relation network for mobile phone screen defect classification via a few samples. 1113-1120 - Guang Hua

, Qingyi Wang, Dengpan Ye
, Haijian Zhang, Guoyin Wang, Shuyin Xia:
Factors affecting forensic electric network frequency matching - A comprehensive study. 1121-1130 - Gaofei Huang

, Qihong Zhong, Hui Zheng
, Sai Zhao
, Dong Tang:
Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes. 1131-1144 - Dandan Liu

, Wei Wu, Liangqi Gui, Tao Jiang
:
OAM mode purity improvement based on antenna array. 1145-1153 - Jianyi Zhang

, Fangjiao Zhang
, Qichao Jin, Zhiqiang Wang, Xiaodong Lin
, Xiali Hei
:
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning. 1154-1167 - Yin Long, Hang Ding, Simon Murphy:

Semi-supervised learning based hybrid beamforming under time-varying propagation environments. 1168-1177 - Marek Gajewski, Olgierd Hryniewicz

, Agnieszka Jastrzebska
, Mariusz Kozakiewicz, Karol R. Opara, Jan W. Owsinski, Slawomir Zadrozny
, Tomasz Zwierzchowski:
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques. 1178-1188 - Jinxiang Liu, Xiaotao Zhang, Jun Yang, Huiping Yang:

Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model. 1189-1197 - Wenwen Gong, Huiping Wu, Xiaokang Wang, Xuyun Zhang

, Yawei Wang
, Yifei Chen, Mohammad Reza Khosravi:
Diversified and compatible web APIs recommendation based on game theory in IoT. 1198-1209
Volume 10, Number 5, 2024
- Fei Tang, Chunliang Ma, Kefei Cheng:

Privacy-preserving authentication scheme based on zero trust architecture. 1211-1220 - Sai Zou, Junrui Wu

, Haisheng Yu
, Wenyong Wang, Lisheng Huang, Wei Ni, Yan Liu
:
Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization. 1221-1233 - Junchao Yang

, Ali Kashif Bashir
, Zhiwei Guo, Keping Yu
, Mohsen Guizani:
Intelligent cache and buffer optimization for mobile VR adaptive transmission in 5G edge computing networks. 1234-1244 - Abeer A. Z. Ibrahim

, Fazirulhisyam Hashim, Aduwati Sali, Nor Kamariah Noordin, Keivan Navaie
, Saber M. E. Fadul
:
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture. 1245-1257 - Sampa Sahoo, Kshira Sagar Sahoo

, Bibhudatta Sahoo, Amir H. Gandomi
:
A learning automata based edge resource allocation approach for IoT-enabled smart cities. 1258-1266 - Navid Pourjafari

, Jalil Seifali Harsini:
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems. 1267-1279 - Gang Qiao, Xizhu Qiang, Lei Wan

, Hanbo Jia:
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring. 1280-1288 - Errong Pei, Chenkai Ren, Wei Li, Qimei Chen, Bingguang Deng, Jiarui Song

:
Performance analysis for MU-MIMO enabled LTE-U networks coexisting with D2D and WiFi network. 1289-1296 - Dongxuan He

, Zhi Zhang, Hao Lin, Zuomin Wu, Yingpei Huang, Zhaocheng Wang:
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels. 1297-1304 - Alicja Olejniczak

, Olga Blaszkiewicz, Krzysztof K. Cwalina, Piotr Rajchowski
, Jaroslaw Sadowski
:
LOS and NLOS identification in real indoor environment using deep learning approach. 1305-1312 - Fatemeh Asghari Azhiri

, Behzad Mozaffari Tazehkand
, Reza Abdolee:
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array. 1313-1321 - Fereshteh Salimian Rizi, Abolfazl Falahati

:
The Generalized-Fisher composite fading model for the next generation of mobile communication systems. 1322-1331 - Shenghai Chen, Liang Yang, Xianfu Lei:

Performance analysis of UAV-based mixed underwater PLC-RF systems. 1332-1340 - Peng Shixin

, Chen Kai
, Tian Tian, Jingying Chen:
An autoencoder-based feature level fusion for speech emotion recognition. 1341-1351 - Yuhan Liu, He Yan, Qilie Liu, Wei Zhang, Junbin Huang:

ECO++: Adaptive deep feature fusion target tracking method in complex scene. 1352-1364 - Boran Yang

, Dapeng Wu, Ruyan Wang, Zhigang Yang, Yu Yang
:
A fine-grained intrusion protection system for inter-edge trust transfer. 1365-1374 - Zufan Zhang, Yang Li

, Xiaoqin Yan, Zonghua Ouyang:
A low-complexity AMP detection algorithm with deep neural network for massive mimo systems. 1375-1386 - Chunlong He, Xinjie Li, Yin Huang, Jianzhen Lin, Gongbin Qian, Xingquan Li:

Secure data rate maximization for full-duplex UAV-enabled base station. 1387-1393 - Yue Wu

, Tao Jing
, Qinghe Gao
, Yingzhen Wu
, Yan Huo
:
Game-theoretic physical layer authentication for spoofing detection in internet of things. 1394-1404 - Wei Zhou

, Xing Jiang, Qingsong Luo, Bingli Guo, Xiang Sun, Fengyuan Sun, Lingyu Meng:
AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks. 1405-1414 - Jiaqi Wang, Ning Lu, Ziyang Gong, Wenbo Shi

, Chang Choi:
A secure double spectrum auction scheme. 1415-1427 - Xuyang Jing, Jingjing Zhao, Zheng Yan

, Witold Pedrycz, Xian Li:
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing. 1428-1438 - Junhui Zhao, Lihua Yang

, Xiaoting Ma
, Ziyang Zhang
:
Analytical modeling of cache-enabled heterogeneous networks using Poisson cluster processes. 1439-1447 - Huaji Zhou, Jing Bai, Yiran Wang

, Junjie Ren, Xiaoniu Yang, Licheng Jiao:
Deep radio signal clustering with interpretability analysis based on saliency map. 1448-1458 - Zhiqin Wang, Hui Liu, Lixia Xiao

, Liuke Li, Guochao Song, Tao Jiang:
Index modulation aided generalized space-time block coding: A unified MIMO framework. 1459-1470 - Yizhou Xu, Haidong Xie

, Nan Ji, Yuanqing Chen, Naijin Liu, Xueshuang Xiang:
Dynamic adversarial jamming-based reinforcement learning for designing constellations. 1471-1479 - Changyin Dong, Yujia Chen, Hao Wang

, Leizhen Wang
, Ye Li, Daiheng Ni
, De Zhao, Xuedong Hua:
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles. 1480-1492 - Ruiyu Wang

, Yao Sun
, Chao Zhang
, Bowen Yang, Muhammad Ali Imran
, Lei Zhang:
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization. 1493-1502 - Haleema Sadia

, Ahmad Kamal Hassan, Ziaul Haq Abbas, Ghulam Abbas
, Muhammad Waqas, Zhu Han:
IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges. 1503-1528 - Hongjiang Lei

, Chen Zhu, Ki-Hong Park
, Imran Shafique Ansari
, Weijia Lei, Hong Tang, Kyeong Jin Kim:
Outage analysis of aerial semi-grant-free NOMA systems. 1529-1541 - Zhichao Liu, Jinhua Yang, Juan Wang, Lin Yue:

Design of modified model of intelligent assembly digital twins based on optical fiber sensor network. 1542-1552
Volume 10, Number 6, 2024
- Jungsook Bae, Waqas Khalid, Anseok Lee, Heesoo Lee, Song Noh, Heejung Yu

:
Overview of RIS-enabled secure transmission in 6G wireless networks. 1553-1565 - Bin Li, Wenshuai Liu, Wancheng Xie

:
Secure transmission design for RIS-aided symbiotic radio networks: A DRL approach. 1566-1575 - Min Wei, Qianying Zhao, Bo Lei, Yizhuo Cai

, Yushun Zhang, Xing Zhang, Wenbo Wang:
FedACT: An adaptive chained training approach for federated learning in computing power networks. 1576-1589 - Yan Gu, Feng Cheng, Lijie Yang, Junhui Xu

, Xiaomin Chen, Long Cheng
:
Cost-aware cloud workflow scheduling using DRL and simulated annealing. 1590-1599 - Ziyi Lu

, Tianxiong Wu, Jinshan Su, Yunting Xu, Bo Qian
, Tianqi Zhang, Haibo Zhou:
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections. 1600-1610 - Xiaoge Huang, Hongbo Yin, Qianbin Chen, Yu Zeng, Jianfeng Yao:

DAG-based swarm learning: A secure asynchronous learning framework for Internet of Vehicles. 1611-1621 - Daoqi Han

, Yang Liu, Fangwei Zhang, Yueming Lu:
Game-theoretic private blockchain design in edge computing networks. 1622-1634 - Chaoqiong Fan, Xinyu Wu, Bin Li, Chenglin Zhao:

Partial observation learning-based task offloading and spectrum allocation in UAV collaborative edge computing. 1635-1643 - Lujie Guo, Fengxian Guo, Mugen Peng:

A novel routing method for dynamic control in distributed computing power networks. 1644-1652 - Feifei Shi, Huansheng Ning, Xiaohong Zhang, Rongyang Li, Qiaohui Tian, Shiming Zhang, Yuanyuan Zheng, Yudong Guo, Mahmoud Daneshmand:

A new technology perspective of the Metaverse: Its essence, framework and challenges. 1653-1665 - Hao Du, Supeng Leng, Jianhua He, Kai Xiong, Longyu Zhou:

Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles. 1666-1676 - Mihaela I. Chidean

, Luis Ignacio Jiménez Gil
, Javier Carmona-Murillo
, David Cortés-Polo
:
Information theory based clustering of cellular network usage data for the identification of representative urban areas. 1677-1685 - Yuan Ai

, Chenxi Liu, Mugen Peng:
Joint user association and resource allocation for cost-efficient NOMA-enabled F-RANs. 1686-1697 - Haoye Chai, Supeng Leng, Jianhua He, Ke Zhang:

Digital twin empowered lightweight and efficient blockchain for dynamic internet of vehicles. 1698-1707 - Tong Tang

, Yi Yang, Dapeng Wu, Ruyan Wang, Zhidu Li:
Chaotic moving video quality enhancement based on deep in-loop filtering. 1708-1715 - Neena Susan Shaji, Raja Muthalagu

:
Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN. 1716-1731 - Zhigang Du, Sunxuan Zhang, Zijia Yao, Zhenyu Zhou, Muhammad Tariq

:
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks. 1732-1740 - Xiao Lin

, Ruolin Wu, Haibo Mei
, Kun Yang:
A game incentive mechanism for energy efficient federated learning in computing power networks. 1741-1747 - Qiuping Zhang, Sheng Sun, Junjie Luo, Min Liu, Zhongcheng Li, Huan Yang, Yuwei Wang

:
Collaborative non-chain DNN inference with multi-device based on layer parallel. 1748-1759 - Yuanzhi He

, Fan Yang, Guodong Han, Yuanyuan Li:
High-throughput SatCom-on-the-move antennas: Technical overview and state-of-the-art. 1760-1768 - Xiaoyi Zhou

, Liang Huang
, Tong Ye, Weiqiang Sun:
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks. 1769-1781 - Weijian Tao, Zufan Zhang

, Xi Liu, Maobin Yang:
A fusion deep learning framework based on breast cancer grade prediction. 1782-1789 - Zhixiong Chen

, Jiawei Yang, Zhenyu Zhou:
UAV-assisted MEC offloading strategy with peak AOI boundary optimization: A method based on DDQN. 1790-1803 - Xingquan Li, Hongxia Zheng, Chunlong He, Xiaowen Tian, Xin Lin:

Robust beamforming design for energy harvesting efficiency maximization in RIS-aided SWIPT system. 1804-1812 - Guojun Chen

, Kaixuan Xie, Wenqiang Luo, Yinfei Xu, Lun Xin, Tiecheng Song, Jing Hu:
Rate distortion optimization for adaptive gradient quantization in federated learning. 1813-1825 - Yuhong Xie, Yuan Zhang, Tao Lin

, Zipeng Pan, Si-Ze Qian, Bo Jiang, Jinyao Yan:
Short video preloading via domain knowledge assisted deep reinforcement learning. 1826-1836 - Uchechukwu Awada

, Jian-Kang Zhang
, Sheng Chen, Shuangzhi Li
, Shouyi Yang:
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system. 1837-1850 - Qianwen Li, Xiang Wang, Qingqi Pei, Xiaohua Chen, Kwok-Yan Lam:

Consistency preserving database watermarking algorithm for decision trees. 1851-1863 - Miao Wu, Qinghua Zhang, Chengying Wu, Guoyin Wang:

End-to-end multi-granulation causality extraction model. 1864-1873 - Dawei Wang, Xuanrui Li, Menghan Wu, Yixin He

, Yi Lou, Yu Pang, Yi Lu:
Secure intelligent reflecting surface assisted mobile edge computing system with wireless power transfer. 1874-1880 - Xiaoyan Hu, Meiqun Gui, Guang Cheng, Ruidong Li

, Hua Wu
:
Multi-class Bitcoin mixing service identification based on graph classification. 1881-1893 - Rongrong Zhang, Mengyu Li, Xinglong Li, Yong Guan, Cheng'an Zhao, Huan Qi, Changquan Qiu:

Sum-throughput maximization for UAV-aided energy-harvesting WBANs: Hovering altitude design, power control and time allocation. 1894-1903 - Jiangtao Liu

, Kai Wu
, Tao Su, J. Andrew Zhang
:
Practical frequency-hopping MIMO joint radar communications: Design and experiment. 1904-1914

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














