


default search action
Digital Communications and Networks, Volume 9
Volume 9, Number 1, February 2023
- Shahid Mumtaz

, Gautam Srivastava, Wei Wei:
Special issue on machine learning-driven big data and blockchain techniques for communication. 1-2 - Chunying Zhang, Jing Ren, Lu Liu, Shouyue Liu, Xiaoqi Li, Liya Wang:

Set pair three-way overlapping community discovery algorithm for weighted social internet of things. 3-13 - Pengcheng Wei, Bo Wang

, Xiaojun Dai
, Li Li, Fangcheng He:
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder. 14-21 - Hongfei Zhang, Li Zhu, Tao Dai, Liwen Zhang, Xi Feng, Li Zhang, Kaiqi Zhang

:
Smart object recommendation based on topic learning and joint features in the social internet of things. 22-32 - Ashwin Verma, Pronaya Bhattacharya, Umesh Bodkhe

, Deepti Saraswat
, Sudeep Tanwar
, Kapal Dev
:
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment. 33-46 - Baofeng Ji

, Mingkun Zhang
, Ling Xing, Xiaoli Li, Chunguo Li, Congzheng Han, Hong Wen:
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract. 47-55 - Wanneng Shu, Li Yang:

Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks. 56-66 - Aimin Yang, Chaomeng Lu

, Jie Li, Xiangdong Huang, Tianhao Ji, Xichang Li, Yichao Sheng:
Application of meta-learning in cyberspace security: a survey. 67-78 - Varun Kohli

, Sombuddha Chakravarty
, Vinay Chamola
, Kuldip Singh Sangwan
, Sherali Zeadally:
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions. 79-89 - Luo Xianquan

, Chunjiong Zhang
, Longju Bai:
A fixed clustering protocol based on random relay strategy for EHWSN. 90-100 - Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi

, Ali Dehghantanha, Hadis Karimipour:
An ensemble deep learning model for cyber threat hunting in industrial internet of things. 101-110 - Haifeng Lin

, Qilin Xue, Jiayin Feng, Di Bai:
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. 111-124 - Debasmita Mishra

, Bighnaraj Naik, Janmenjoy Nayak
, Alireza Souri
, Pandit Byomakesha Dash, S. Vimal
:
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network. 125-137 - Yueshen Xu

, Zhiying Wang, Honghao Gao, Zhiping Jiang, Yuyu Yin, Rui Li:
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things. 138-145 - Aimin Yang, Zezhong Ma

, Chunying Zhang, Yang Han
, Zhibin Hu, Wei Zhang, Xiangdong Huang, Yafeng Wu:
Review on application progress of federated learning model and security hazard protection. 146-158
- Xiaoling Huang, Youxia Dong

, Guodong Ye
, Wun-She Yap
, Bok-Min Goi:
Visually meaningful image encryption algorithm based on digital signature. 159-165 - Milan Groshev

, Gabriele Baldoni
, Luca Cominardi
, Antonio de la Oliva
, Robert Gazda
:
Edge robotics: are we ready? an experimental evaluation of current vision and future directions. 166-174 - Ennio Gambi, Linda Senigagliesi

, Andrea Barbaresi, Matteo Mellini, Adelmo De Santis:
A WKNN-based approach for NB-IoT sensors localization. 175-182 - Ioanna Roussaki

, Kevin Doolin
, Antonio F. Skarmeta, George Routis, Juan Antonio López-Morales
, Ethel Claffey
, Manuel Mora, Juan Antonio Martínez:
Building an interoperable space for smart agriculture. 183-193 - Francesco Buccafurri

, Gianluca Lax
, Lorenzo Musarella
, Antonia Russo
:
An Ethereum-based solution for energy trading in smart grids. 194-202 - Xiaonan Wang, Xilan Chen, Xingwei Wang:

Secure vehicular data communication in Named Data Networking. 203-210 - Heba Saleous

, Muhusina Ismail, Saleh H. Aldaajeh
, Nisha Madathil
, Saed Alrabaee
, Kim-Kwang Raymond Choo, Nabeel Al-Qirim
:
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. 211-222 - Denzil Furtado

, André F. Gygax
, Chien Aun Chan
, Ashley I. Bush
:
Time to forge ahead: The Internet of Things for healthcare. 223-235 - Hamid Taramit

, Luis Orozco-Barbosa
, Abdelkrim Haqiq
:
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism. 236-251 - Abuzar B. M. Adam

, Xiaoyu Wan, Zhengqiang Wang
:
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems. 252-263 - Wali Ullah Khan

, Furqan Jameel, Asim Ihsan
, Omer Waqar, Manzoor Ahmed
:
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks. 264-269 - Jesús Sánchez Gómez

, Rafael Marín-Pérez
, Ramon Sanchez-Iborra, Miguel Angel Zamora
:
MEC-based architecture for interoperable and trustworthy internet of moving things. 270-279 - Rui Liu

, Jianping Pan:
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring. 280-291
Volume 9, Number 2, April 2023
- Fazlullah Khan

, Joel J. P. C. Rodrigues, Mian Ahmad Jan:
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications. 293-295 - Jing Zhang, Qichen Yan, Xiaogang Zhu

, Keping Yu
:
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine. 296-305 - Han Wang

, Fida Hussain Memon
, Xianpeng Wang
, Xingwang Li
, Ning Zhao
, Kapal Dev
:
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach. 306-312 - YeEun Kim, Junggab Son

, Reza M. Parizi
, Gautam Srivastava
, Heekuck Oh:
3-Multi ranked encryption with enhanced security in cloud computing. 313-326 - Xiang Wu, Huanhuan Wang, Yongting Zhang, Ruirui Li:

A secure visual framework for multi-index protection evaluation in networks. 327-336 - Weizheng Wang

, Huakun Huang
, Zhimeng Yin, Thippa Reddy Gadekallu
, Mamoun Alazab, Chunhua Su:
Smart contract token-based privacy-preserving access control system for industrial Internet of Things. 337-346 - Jun Liu

, Kai Qian, Zhibao Qin, Mohammad Dahman Alshehri
, Qiong Li, Yonghang Tai:
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access. 347-357 - Chintan Patel

, Ali Kashif Bashir
, Ahmad Ali AlZubi
, Rutvij H. Jhaveri
:
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element. 358-366 - Qusay Medhat Salih

, Md. Arafatur Rahman
, A. Taufiq Asyhari, Muhammad Kamran Naeem
, Mohammad N. Patwary, Ryan Alturki
, Mohammed Abdulaziz Ikram:
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications. 367-382 - Bello Musa Yakubu

, Majid Iqbal Khan
, Abid Khan
, Farhana Jabeen, Gwanggil Jeon:
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. 383-392 - Saeid Yazdanpanah, Saman Shojae Chaeikar

, Alireza Jolfaei:
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare. 393-399 - Lingwei Xu

, Hao Yin, Hong Jia, Wenzhong Lin, Xinpeng Zhou, Yong Fu, Xu Yu
:
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks. 400-410 - Anichur Rahman

, Md. Jahidul Islam, Shahab S. Band, Ghulam Muhammad
, Kamrul Hasan
, Prayag Tiwari
:
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT. 411-421 - Nilesh Kumar Jadav

, Riya Kakkar, Harsh Mankodiya
, Rajesh Gupta, Sudeep Tanwar
, Smita Agrawal
, Ravi Sharma:
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G. 422-435 - Bahar Farahani, Amin Karimi Monsefi

:
Smart and collaborative industrial IoT: A federated learning and data space approach. 436-447
- Jianhui Lv, Yuhui Shi, Hui Cheng, Zhiwei Lin, Lianbo Ma:

Guest editorial: AI and edge computing driven technologies and applications. 448-449 - Kuanishbay Sadatdiynov

, Laizhong Cui
, Lei Zhang, Joshua Zhexue Huang, Salman Salloum
, Mohammad Sultan Mahmud
:
A review of optimization methods for computation offloading in edge computing networks. 450-461 - Qing Li

, He Huang, Yong Jiang, Jingpu Duan:
AdaptNF: Adaptive service chain scheduling with stateless migration and NF consolidation. 462-472 - Jiabao Wen, Jiachen Yang

, Tianying Wang, Yang Li
, Zhihan Lv:
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing. 473-482 - Ziqiao Wang

, Xiaomu Cai
:
Teaching mechanism empowered by virtual simulation: Edge computing-driven approach. 483-491 - Jie Li, Zhiping Yang, Xingwei Wang, Yichao Xia, Shijian Ni:

Task offloading mechanism based on federated reinforcement learning in mobile edge computing. 492-504 - Yumin Shen, Hongyu Guo

:
Research on high-performance English translation based on topic model. 505-511
- Zhao Li

, Pintian Lyu
, Jun Li, Zhixian Chang, Jia Liu
, Zheng Yan:
SCIM: Incorporating secure communication and interference management in one operation. 512-522 - Yunpeng Zhang

, Luliang Jia
, Nan Qi, Yifan Xu
, Meng Wang:
Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach. 523-533 - Amin Jamali

, Mehdi Berenjkoub, Hossein Saidi, Behrouz Shahgholi Ghahfarokhi
:
Survivability evaluation for networks carrying complex traffic flows. 534-544 - Ruyan Wang, Chunyan Zang

, Peng He
, Yaping Cui, Dapeng Wu:
Auction-based profit maximization offloading in mobile edge computing. 545-556 - Souleymane Berthe, Xiaorong Jing

, Hongqing Liu, Qianbin Chen:
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems. 557-566 - Chengcai Wang, Ao Wu, Yueqi Hou, Xiaolong Liang, Luo Xu, Xiaomo Wang:

Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms. 567-579 - Xiaoge Huang, Zhi Chen, Qianbin Chen, Jie Zhang

:
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks. 580-589 - Hongcheng Huang

, Peixin Ye, Min Hu, Jun Wu:
A multi-point collaborative DDoS defense mechanism for IIoT environment. 590-601
- Qing Xue, Gang Feng:

Erratum to "A robust beam tracking scheme for millimeter wave HetNets" [Digit. Commun. Network. 8 (6) (2022) 1115-1121]. 602
Volume 9, Number 3, June 2023
- Peng Zheng

, Jianwen Ding, Dan Fei, Jiayi Zhang, Bo Ai, Xiao Li
, Shi Jin, Tiejun Cui:
Field trial measurement and channel modeling for reconfigurable intelligent surface. 603-612 - Guang Chen

, Yueyun Chen, Zhiyuan Mai
, Conghui Hao, Meijie Yang, Shuangshuang Han, Liping Du:
Joint multiple resource allocation for offloading cost minimization in IRS-assisted MEC networks with NOMA. 613-627 - Xiaoting Ma

, Junhui Zhao, Jieyu Liao
, Ziyang Zhang:
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks. 628-637 - Wenwan Xu, Jun Zhang

, Shu Cai
, Jue Wang, Yi Wu
:
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI. 638-644 - Zining Wang, Min Lin, Shupei Huang, Ming Cheng, Wei-Ping Zhu, Yan Guo:

Robust beamforming for IRS-aided SWIPT in cognitive radio networks. 645-654 - Peixu Liu, Gang Jing, Hongwu Liu, Liang Yang, Theodoros A. Tsiftsis

:
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems. 655-666 - Ziyang Lu

, Yubin Zhao
, Xiaofan Li:
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer. 667-676
- Leonardo Bertolin Furstenau, Yan Pablo Reckziegel Rodrigues, Michele Kremer Sott

, Pedro Leivas, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo
:
Internet of things: Conceptual network structure, main challenges and future directions. 677-687 - Zhuo Chen, Peihong Wei, Yan Li:

Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud. 688-697 - Weidong Yang, Erbo Shen

, Xuyu Wang
, Shiwen Mao
, Yuehong Gong
, Pengming Hu
:
Wi-Wheat+: Contact-free wheat moisture sensing with commodity WiFi based on entropy. 698-709 - Mojtaba Alizadeh, Mohammad Hesam Tadayon

, Alireza Jolfaei
:
Secure ticket-based authentication method for IoT applications. 710-716 - Junjie Ding, Yuxuan Tan, Yanyi Wang

, Jiao Zhang, Menghui He, Feng Zhao
, Li Zhao, Wen Zhou, Yiwei Shi, Min Zhu, Jianjun Yu:
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber. 717-722 - Tongyu Song, Xuebin Tan, Jing Ren, Wenyu Hu, Sheng Wang

, Shizhong Xu, Xiong Wang, Gang Sun
, Hongfang Yu:
DRAM: A DRL-based resource allocation scheme for MAR in MEC. 723-733 - Zhixin Liu

, Jiawei Su, Yuanai Xie
, Yazhou Yuan, Yi Yang, Xinping Guan:
Distributed robust power control in two-tier vehicle networks under uncertain channel environments. 734-742 - Keliang Du, Luhan Wang

, Xiangming Wen, Yu Liu, Haiwen Niu
, Shaoxin Huang:
ML-SLD: A message-level stateless design for cloud-native 5G core network. 743-756 - Yangpeng Dan

, Jianxin Yi
, Xianrong Wan
, Yunhua Rao
, Yan Liu:
A robust symbol timing strategy for cellular systems. 757-768 - Ao Li

, Taihai Yang, Wenxin Wu, Lei Luo
:
Soft transmission of 3D video for low power and low complexity scenario. 769-778 - Weimin Kang

:
Nonbinary ldpc-coded probabilistic shaping scheme for MIMO systems based on signal space diversity. 779-787 - Miaona Huang, Jun Chen

:
A novel proactive soft load balancing framework for ultra dense network. 788-796 - Pengfei Du

, Hongjiang Lei
, Imran Shafique Ansari
, Jianbo Du, Xiaoli Chu
:
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks. 797-808
Volume 9, Number 4, August 2023
- Lupeng Zhang

, Pingchuan Wang
, Yuming Zhang, Zongzheng Chi
, Ning Tong, Lei Wang, Fengqi Li
:
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT. 809-816 - Ye Zhu, Zhiqiang Liu, Peng Wang

, Chenglie Du:
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G. 817-826 - Jianlong Zhang, Guangzu Fang, Bin Wang, Xiaobo Zhou, Qingqi Pei, Chen Chen

:
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network. 827-835 - Siguang Chen

, Bei Tang, Kun Wang:
Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT. 836-845 - Junlin Zhang, Mingqian Liu

, Nan Zhao, Yunfei Chen, Qinghai Yang, Zhiguo Ding:
Spectrum and energy efficient multi-antenna spectrum sensing for green UAV communication. 846-855
- Leonardo Bertolin Furstenau, Pedro Leivas

, Michele Kremer Sott
, Michael S. Dohan, José Ricardo López-Robles
, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo
:
Big data in healthcare: Conceptual network structure, key challenges and opportunities. 856-868 - Jalaluddin Qureshi

, Chuan Heng Foh:
Triangular code: Near-optimal linear time fountain code. 869-878 - Adel Aldalbahi, Nazli Siasi, Asim Mazin

, Mohammed A. Jasim
:
Digital compass for multi-user beam access in mmWave cellular networks. 879-886 - Yuwen Liu

, Rongju Yao
, Song Jia, Fan Wang
, Ruili Wang
, Rui Ma
, Lianyong Qi:
A label noise filtering and label missing supplement framework based on game theory. 887-895 - Entong Meng, Xiangyuan Bu, Jihong Yu

, Jianping An, Xuanhe Yang:
Robust or nonrobust: On MC-DS-CDMA acquisition in LEO satellite communications. 896-905 - Yizhou Shen

, Shigen Shen
, Qi Li, Haiping Zhou, Zongda Wu
, Youyang Qu:
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. 906-919 - Yingzhe Luo

, Jianhao Hu:
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system. 920-930 - Linlin Feng, Zhizhong Zhang, Haonan Hu, Errong Pei:

Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process. 931-940 - Gabriel Francisco Lorençon Ribeiro Bernardes, Rogério Ishibashi

, André A. S. Ivo
, Valério Rosset, Bruno Yuji Lino Kimura
:
Prototyping low-cost automatic weather stations for natural disaster monitoring. 941-956 - Shi Dong

, Yuanjun Xia:
Network traffic identification in packet sampling environment. 957-970 - Tianci Zhang

, Junjie Zhou, Zhengchuan Chen
, Zhong Tian
, Wanli Wen, Yunjian Jia:
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation. 971-980 - Jiale Zhang

, Yue Liu
, Di Wu
, Shuai Lou, Bing Chen
, Shui Yu
:
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems. 981-989 - Duo Wu

, Lin Cui
:
A comprehensive survey on Segment Routing Traffic Engineering. 990-1008 - Peppino Fazio

, Miralem Mehic
, Miroslav Voznák
:
Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view. 1009-1022 - Yuchao Zhu

, Shaowei Wang:
Traffic prediction enabled dynamic access points switching for energy saving in dense networks. 1023-1031
Volume 9, Number 5, October 2023
- Muhammad Ali Naeem

, Yousaf Bin Zikria
, Rashid Ali
, Usman Tariq, Yahui Meng
, Ali Kashif Bashir
:
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective. 1033-1052 - Yilei Wang, Zhaojie Wang

, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen
, Minghao Zhao
:
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems. 1053-1060 - Yang Li

, Jiachen Yang
, Jiabao Wen:
Entropy-based redundancy analysis and information screening. 1061-1069 - Zhenjiang Qian

, Rui Xia, Gaofei Sun, Xiaoshuang Xing, Kaijian Xia:
A measurable refinement method of design and verification for micro-kernel operating systems in communication network. 1070-1079 - Neha Garg

, Rajat Petwal, Mohammad Wazid
, Devesh Pratap Singh, Ashok Kumar Das
, Joel J. P. C. Rodrigues:
On the design of an AI-driven secure communication scheme for internet of medical things environment. 1080-1089 - Tun Li

, Yanbing Liu, Qilie Liu, Wei Xu, Yunpeng Xiao, Hong Liu
:
A malware propagation prediction model based on representation learning and graph convolutional networks. 1090-1100 - Xiancui Xiao, Xiangwei Zheng

, Ji Bian, Cun Ji
, Xinchun Cui:
A dynamic and resource sharing virtual network mapping algorithm. 1101-1112 - Tejasvi Alladi

, Varun Kohli
, Vinay Chamola
, F. Richard Yu:
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. 1113-1122 - Abbas Yazdinejad

, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava
, Reza M. Parizi
:
Accurate threat hunting in industrial internet of things edge devices. 1123-1130 - Tehsin Kanwal, Hasina Attaullah

, Adeel Anjum, Abid Khan
, Gwanggil Jeon:
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. 1131-1140 - Xia Lei, Yongkai Fan, Xiong-Lin Luo:

On fine-grained visual explanation in convolutional neural networks. 1141-1147
- Qasim Jan

, Shahid Hussain
, Zhiwen Pan, Nan Liu
, Zakir Ali
, Zechen Liu, Xiaohu You:
Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes. 1148-1156 - Qiang Wang

, Hao Jiang, Ying Jiang, Shuwen Yi, Qi Nie, Geng Zhang:
Multiplex network infomax: Multiplex network embedding via information fusion. 1157-1168 - Guangquan Xu

, Wenyu Dong
, Jun Xing, Wenqing Lei
, Jian Liu, Lixiao Gong, Meiqi Feng
, James Xi Zheng
, Shaoying Liu:
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection. 1169-1179 - Xin Liu

, Liang Zheng
, Sumi Helal
, Weishan Zhang
, Chunfu Jia, Jiehan Zhou:
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs. 1180-1189 - Anqi Meng

, Guandong Wei
, Yao Zhao
, Xiaozheng Gao, Zhanxin Yang:
Green resource allocation for mobile edge computing. 1190-1199 - Bin Cao, Tingyong Wu

, Xiang Bai:
Stochastic programming based multi-arm bandit offloading strategy for internet of things. 1200-1211 - Junwei Wang, Xianglin Wei

, Jianhua Fan, Qiang Duan, Jianwei Liu
, Yangang Wang:
Request pattern change-based cache pollution attack detection and defense in edge computing. 1212-1220 - Weishan Zhang

, Xiao Chen
, Ke He, Leiming Chen
, Liang Xu, Xiao Wang
, Su Yang:
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting. 1221-1229 - Jingyuan Duan, Ling Tian, Jianqiao Mao

, Jiaxin Li:
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions. 1230-1241
Volume 9, Number 6, December 2023
- Weiwei Jiang

:
Software defined satellite networks: A survey. 1243-1264 - Homayun Kabir

, Mau-Luen Tham
, Yoong Choon Chang:
Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions. 1265-1290 - Jienan Chen, Jiyun Tao, Siyu Luo, Shuai Li, Chuan Zhang

, Wei Xiang
:
A deep learning driven hybrid beamforming method for millimeter wave MIMO system. 1291-1300 - Alex Medeiros de Araújo, Anderson Bergamini de Neira

, Michele Nogueira:
Autonomous machine learning for early bot detection in the internet of things. 1301-1309 - Shumei Liu, Yao Yu

, Lei Guo, Phee Lep Yeoh, Branka Vucetic, Yonghui Li:
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks. 1310-1318 - Hui-Ping Yin, Chao Bai, Haipeng Ren:

Echo state network based symbol detection in chaotic baseband wireless communication. 1319-1330 - Shuo Yuan

, Mugen Peng
, Yaohua Sun, Xiqing Liu:
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges. 1331-1339 - Mihailo Vesovic, Aleksandra Smiljanic, Dusan Kostic:

Fast and scalable routing protocols for data center networks. 1340-1350 - Jinfang Jiang, Chuan Lin

, Guangjie Han
, Adnan M. Abu-Mahfouz
, Syed Bilal Hussain Shah, Miguel Martínez-García:
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities. 1351-1362 - Shahriar Kaisar

, Joarder Kamruzzaman
, Gour C. Karmakar, Md. Mamunur Rashid:
Decentralized content sharing in mobile ad-hoc networks: A survey. 1363-1398 - Shuang Liu, Jie Tian

, Chao Zhai
, Tiantian Li:
Joint computation offloading and resource allocation in vehicular edge computing networks. 1399-1410 - Yajie He, Chonghui Xiao, Shuai Wang, Yun-Hao Liu

, Zhaoyuan Xu, Haoquan Zhou, Min Zhao, Wei Gong:
Smart all-time vision: The battery-free video communication for urban administration and law enforcement. 1411-1420 - Chu Chu

, Guangjun Wen, Jianyu Niu:
Efficient and robust missing key tag identification for large-scale RFID systems. 1421-1433 - Zezhou Luo, Hongcheng Zhuang:

A novel fractional uplink power control framework for self-organizing networks. 1434-1440 - Chenquan Gan

, Jinhui Yao, Shuaiying Ma, Zufan Zhang, Lianxiang Zhu
:
The deep spatiotemporal network with dual-flow fusion for video-oriented facial expression recognition. 1441-1447 - Haohao Wang, Mengmeng Sun, Lianming Zhang

, Pingping Dong, Yehua Wei, Jing Mei:
Scheduling optimization for upstream dataflows in edge computing. 1448-1457 - Hemant Kumar Narsani, Ali Ranjha, Kapal Dev

, Fida Hussain Memon
, Nawab Muhammad Faseeh Qureshi
:
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems. 1458-1464 - Long Zhang, Bin Cao, Gang Feng:

Opportunistic admission and resource allocation for slicing enhanced IoT networks. 1465-1476 - Chuhuan Liu, Yi Zhang

, Guohang Niu, Luliang Jia
, Liang Xiao
, Jiangxia Luan:
Towards reinforcement learning in UAV relay for anti-jamming maritime communications. 1477-1485 - Abel Efetobor Edje, Shaffie Muhammad Abd Latiff, Weng Howe Chan:

IoT data analytic algorithms on edge-cloud infrastructure: A review. 1486-1515

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














