default search action
Digital Communications and Networks, Volume 10
Volume 10, Number 1, 2024
- Jiachen Yang, Yiwen Sun, Yutian Lei, Zhuo Zhang, Yang Li, Yongjun Bao, Zhihan Lv:
Reinforcement learning based edge computing in B5G. 1-6 - Mingzi Chen, Xin Wei, Peizhong Xie, Zhe Zhang:
QoE oriented intelligent online learning evaluation technology in B5G scenario. 7-15 - Xue-Yong Yu, Wen-Jin Niu, Ye Zhu, Hong-Bo Zhu:
UAV-assisted cooperative offloading energy efficiency system for mobile edge computing. 16-24 - Daosen Zhai, Huan Li, Xiao Tang, Ruonan Zhang, Haotong Cao:
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks. 25-37 - Mianjie Li, Senfeng Lai, Jiao Wang, Zhihong Tian, Nadra Guizani, Xiaojiang Du, Chun Shan:
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications. 38-44 - Pei Li, Lingyi Wang, Wei Wu, Fuhui Zhou, Baoyun Wang, Qihui Wu:
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks. 45-52 - Zhipeng Cheng, Minghui Liwang, Ning Chen, Lianfen Huang, Nadra Guizani, Xiaojiang Du:
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks. 53-62 - Yan Wu, Chao Yue, Yang Yang, Liang Ao:
Resource allocation for D2D-assisted haptic communications. 63-74 - Ruochen Huang, Wei Feng, Shan Lu, Tao Shan, Changwei Zhang, Yun Liu:
An artificial intelligence diabetes management architecture based on 5G. 75-82 - Jiajia Guo, Tong Chen, Shi Jin, Geoffrey Ye Li, Xin Wang, Xiaolin Hou:
Deep learning for joint channel estimation and feedback in massive MIMO systems. 83-93 - Chan-Yeob Park, Ji-Sung Jung, Yeong-Rong Lee, Beom-Sik Shin, Hyoung-Kyu Song:
Intelligent reflecting surface for sum rate enhancement in MIMO systems. 94-100 - Haie Dou, Lei Wang, Bin Kang, Baoyu Zheng:
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case. 101-108 - Xiaoming He, Yingchi Mao, Yinqiu Liu, Ping Ping, Yan Hong, Han Hu:
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks. 109-116 - Jun Cai, Chuan Yin, Youwei Ding:
Optimization of resource allocation in FDD massive MIMO systems. 117-125 - Naiyu Wang, Wenti Yang, Xiaodong Wang, Longfei Wu, Zhitao Guan, Xiaojiang Du, Mohsen Guizani:
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. 126-134 - Tong Ding, Lei Liu, Yi Zhu, Lizhen Cui, Zhongmin Yan:
IoV environment exploring coordination: A federated learning approach. 135-141 - Kui Zhu, Yongjun Ren, Jian Shen, Pandi Vijayakumar, Pradip Kumar Sharma:
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs. 142-149 - Zhe Wang, Xinhang Li, Tianhao Wu, Chen Xu, Lin Zhang:
A credibility-aware swarm-federated deep learning framework in internet of vehicles. 150-157 - Abdul Wahid, Mounira Msahli, Albert Bifet, Gérard Memmi:
NFA: A neural factorization autoencoder based online telephony fraud detection. 158-167 - Luying Wang, Lingyi Chen, Neal N. Xiong, Anfeng Liu, Tian Wang, Mianxiong Dong:
An intelligent active probing and trace-back scheme for IoT anomaly detection. 168-181 - Mohiuddin Ahmed, A. N. M. Bazlur Rashid:
EDSUCh: A robust ensemble data summarization method for effective medical diagnosis. 182-189 - Farhan Ullah, Shamsher Ullah, Gautam Srivastava, Jerry Chun-Wei Lin:
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. 190-204 - Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann:
Feature extraction for machine learning-based intrusion detection in IoT networks. 205-216 - Yong Li, Rui Liu, Xianlong Jiao, Youqiang Hu, Zhen Luo, Francis C. M. Lau:
Doped low-density parity-check codes. 217-226 - Shaopeng Guan, Conghui Zhang, Yilin Wang, Wenqing Liu:
Hadoop-based secure storage solution for big data in cloud computing environment. 227-236
Volume 10, Number 2, 2024
- Jiajie Guo, Muhammad Bilal, Yuying Qiu, Cheng Qian, Xiaolong Xu, Kim-Kwang Raymond Choo:
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities. 237-247 - Kangde Liu, Zheng Yan, Xueqin Liang, Raimo Kantola, Chuangyue Hu:
A survey on blockchain-enabled federated learning and its prospects with digital twin. 248-264 - Yuling Chen, Xiong Yang, Tao Li, Yi Ren, Yangyang Long:
A blockchain-empowered authentication scheme for worm detection in wireless sensor network. 265-272 - Wenyi Tang, Ling Tian, Xu Zheng, Ke Yan:
Analyzing topics in social media for improving digital twinning based product development. 273-281 - Jiachen Yang, Meng Xi, Jiabao Wen, Yang Li, Houbing Herbert Song:
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing. 282-291 - Yuteng Xiao, Kaijian Xia, Hongsheng Yin, Yu-Dong Zhang, Zhenjiang Qian, Zhaoyang Liu, Yuehan Liang, Xiaodan Li:
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network. 292-303 - Zhenjiang Qian, Gaofei Sun, Xiaoshuang Xing, Gaurav Dhiman:
Refinement modeling and verification of secure operating systems for communication in digital twins. 304-314 - Davide Calandra, Filippo Gabriele Pratticò, Alberto Cannavò, Claudio Casetti, Fabrizio Lamberti:
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective. 315-327 - Bo Yi, Jianhui Lv, Xingwei Wang, Lianbo Ma, Min Huang:
Digital twin driven and intelligence enabled content delivery in end-edge-cloud collaborative 5G networks. 328-336 - Tianzhe Zhou, Xuguang Zhang, Bing Kang, Mingkai Chen:
Multimodal fusion recognition for digital twin. 337-346 - Hikmat Adhami, Mohammad Al Ja'afreh, Mohamad Hoda, Jiaqi Zhao, Yong Zhou, Abdulmotaleb El-Saddik:
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A. 347-354 - Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. 355-368 - Héber Hwang Arcolezi, Jean-François Couchot, Bechara al Bouna, Xiaokui Xiao:
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates. 369-379 - Renwan Bi, Mingfeng Zhao, Zuobin Ying, Youliang Tian, Jinbo Xiong:
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT. 380-388 - Lihua Yin, Sixin Lin, Zhe Sun, Ran Li, Yuanyuan He, Zhiqiang Hao:
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy. 389-403 - Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Imran Razzak, Mohamed Abd Elfattah:
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach. 404-415 - Silv Wang, Kai Fan, Kuan Zhang, Hui Li, Yintang Yang:
Data complexity-based batch sanitization method against poison in distributed learning. 416-428 - Zhao Li, Xiujuan Liang, Yinghou Liu, Jia Liu, Zheng Yan:
Joint alignment and steering to manage interference. 429-438 - Chaopeng Guo, Zhaojin Zhong, Zexin Zhang, Jie Song:
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT. 439-449 - Zhidu Li, Fuxiang Li, Tong Tang, Hong Zhang, Jin Yang:
Video caching and scheduling with edge cooperation. 450-460 - Sherzod Elamanov, Hyeonseo Son, Bob Flynn, Seong Ki Yoo, Naqqash Dilshad, Jaeseung Song:
Interworking between Modbus and internet of things platform for industrial services. 461-471 - Qingxia Liu, Bang Wang, Jiming Qi, Xianjun Deng:
A new centrality measure based on neighbor loop structure for network dismantling. 472-480 - Sheng Hao, Huyin Zhang, Fei Yang, Chenghao Li, Jing Wang:
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks: Design and analysis. 481-497 - Zhenkun Jin, Yixuan Geng, Chenlu Zhu, Yunzhi Xia, Xianjun Deng, Lingzhi Yi, Xianlan Wang:
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network. 498-508
Volume 10, Number 3, 2024
- Yichi Zhang, Haitao Zhao, Kuo Cao, Li Zhou, Zhe Wang, Yueling Liu, Jibo Wei:
A highly reliable encoding and decoding communication framework based on semantic information. 509-518 - Jiale Wu, Celimuge Wu, Yangfei Lin, Tsutomu Yoshinaga, Lei Zhong, Xianfu Chen, Yusheng Ji:
Semantic segmentation-based semantic communication system for image transmission. 519-527 - Yating Liu, Xiaojie Wang, Zhaolong Ning, Mengchu Zhou, Lei Guo, Behrouz Jedari:
A survey on semantic communications: Technologies, solutions, applications and challenges. 528-545 - Lu Sun, Xiaona Li, Mingyue Zhang, Liangtian Wan, Yun Lin, Xianpeng Wang, Gang Xu:
Multi-layer network embedding on scc-based network with motif. 546-556 - Rong Ma, Zhen Zhang, Yide Ma, Xiping Hu, Edith C. H. Ngai, Victor C. M. Leung:
An improved pulse coupled neural networks model for semantic IoT. 557-567 - Yueling Liu, Shengteng Jiang, Yichi Zhang, Kuo Cao, Li Zhou, Boon-Chong Seet, Haitao Zhao, Jibo Wei:
Extended context-based semantic communication system for text transmission. 568-576 - Yongfeng Tao, Minqiang Yang, Yushan Wu, Kevin Lee, Adrienne S. Kline, Bin Hu:
Depressive semantic awareness from vlog facial and vocal streams via spatio-temporal transformer. 577-585 - Xin Li, Xinghua Lei, Xiuwen Liu, Hang Xiao:
Collision-free parking recommendation based on multi-agent reinforcement learning in vehicular crowdsensing. 609-619 - Guanlin Wu, Haipeng Wang, Yu Liu, You He:
GraphSTGAN: Situation understanding network of slow-fast high maneuvering targets for maritime monitor services of IoT data. 620-630 - Zhaowei Liu, Dong Yang, Shenqiang Wang, Hang Su:
Adaptive multi-channel Bayesian graph attention network for IoT transaction security. 631-644 - Xu Li, Gwanggil Jeon, Wenshuo Wang, Jindong Zhao:
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing. 645-654 - Yaguang Lin, Xiaoming Wang, Liang Wang, Pengfei Wan:
Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things. 655-665 - Lizong Zhang, Yiming Wang, Ke Yan, Yi Su, Nawaf Alharbe, Shuxin Feng:
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things. 666-675 - Ahmad Azab, Mahmoud Khasawneh, Saed Alrabaee, Kim-Kwang Raymond Choo, Maysa Sarsour:
Network traffic classification: Techniques, datasets, and challenges. 676-692 - Mian Guo, Mithun Mukherjee, Jaime Lloret, Lei Li, Quansheng Guan, Fei Ji:
Joint computation offloading and parallel scheduling to maximize delay-guarantee in cooperative MEC systems. 693-705 - Shengyu Zhang, Xiaoqian Li, Kwan Lawrence Yeung:
Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations. 706-715 - Muralitharan Krishnan, Yongdo Lim, Seethalakshmi Perumal, Gayathri Palanisamy:
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach. 716-727 - Yu Zhang, Bei Gong, Qian Wang:
BLS-identification: A device fingerprint classification mechanism based on broad learning for Internet of Things. 728-739 - Zhimin Zhang, Huansheng Ning, Fadi Farha, Jianguo Ding, Kim-Kwang Raymond Choo:
Artificial intelligence in physiological characteristics recognition for internet of things authentication. 740-755 - Qiao Tian, Sicheng Zhang, Shiwen Mao, Yun Lin:
Adversarial attacks and defenses for digital communication signals identification. 756-764 - Silvana Trindade, Luiz F. Bittencourt, Nelson L. S. da Fonseca:
Resource management at the network edge for federated learning. 765-782 - Sabuzima Nayak, Ripon Patgiri, Lilapati Waikhom, Arif Ahmed:
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications. 783-804 - Jie Chen, Jianhua Tang:
UAV-assisted data collection for wireless sensor networks with dynamic working modes. 805-812
Volume 10, Number 4, 2024
- Shasha Tian, Yuanxiang Li, Xiao Zhang, Lu Zheng, Linhui Cheng, Wei She, Wei Xie:
Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG. 813-826 - Jianhang Tang, Guoquan Wu, Mohammad M. Jalalzai, Lin Wang, Bing Zhang, Yi Zhou:
Energy-optimal DNN model placement in UAV-enabled edge computing networks. 827-836 - Jing Bai, Jinsong Gui, Guosheng Huang, Shaobo Zhang, Anfeng Liu:
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing. 837-852 - Tao Huang, Renchao Xie, Yuzheng Ren, F. Richard Yu, Zhuang Zou, Lu Han, Yunjie Liu, Demin Cheng, Yinan Li, Tian Liu:
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet. 853-862 - Yawen Tan, Jiadai Wang, Jiajia Liu:
Strengthening network slicing for Industrial Internet with deep reinforcement learning. 863-872 - Linpei Li, Chunlei Sun, Jiahao Huo, Yu Su, Lei Sun, Yao Huang, Ning Wang, Haijun Zhang:
Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities. 873-883 - Cheng Chi, Yang Liu, Baoluo Ma, Senchun Chai, Puning Zhang, Zihang Yin:
A compatible carbon efficiency information service framework based on the industrial internet identification. 884-894 - Nan Jia, Shaojing Fu, Guangquan Xu, Kai Huang, Ming Xu:
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices. 895-903 - Arif Ullah, Ziaul Haq Abbas, Ghulam Abbas, Fazal Muhammad, Jae-Mo Kang:
Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment. 904-917 - Md. Forkan Uddin:
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing. 918-933 - Yunhao Jiang, Siqi Liu, Minyang Li, Nan Zhao, Minghu Wu:
A new adaptive co-site broadband interference cancellation method with auxiliary channel. 934-947 - Yezeng Wu, Lixia Xiao, Yiming Xie, Guanghua Liu, Tao Jiang:
Efficient signal detector design for OTFS with index modulation. 948-955 - Bohao Cao, Zheng Xiang, Peng Ren, Qiao Li, Baoyi Xu:
Downlink network-coded multiple access with diverse power. 956-964 - Huifang Yu, Qi Zhang:
Certificateless threshold signature from lattice. 965-972 - Yourong Chen, Hao Chen, Zhenyu Xiong, Banteng Liu, Zhangquan Wang, Meng Han:
Game theory attack pricing for mining pools in blockchain-based IoT. 973-988 - Kumar Sekhar Roy, Subhrajyoti Deb, Hemanta Kumar Kalita:
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. 989-1000 - Chi-Bao Le, Dinh-Thuan Do, Miroslav Voznák:
Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper. 1001-1013 - Xuefei Zhang, Junjie Liu, Yijing Li, Qimei Cui, Xiaofeng Tao, Ren Ping Liu, Wenzheng Li:
Vehicle-oriented ridesharing package delivery in blockchain system. 1014-1023 - Xiaodong Zhuang, Xiangrong Tong:
A dynamic algorithm for trust inference based on double DQN in the internet of things. 1024-1034 - Yuanni Liu, Ling Pan, Shanzhi Chen:
A hierarchical blockchain-enabled security-threat assessment architecture for IoV. 1035-1047 - Arslan Khalid, Prapun Suksompong:
Application of maximum rank distance codes in designing of STBC-OFDM system for next-generation wireless communications. 1048-1056 - Wenjie Liang, Chengxiang Li, Lin Cui, Fung Po Tso:
Position-aware packet loss optimization on service function chain placement. 1057-1067 - Hailin Feng, Dongliang Chen, Haibin Lv, Zhihan Lv:
Game theory in network security for digital twins in industry. 1068-1078 - Ankita A. Mahamune, M. M. Chandane:
Trust-based co-operative routing for secure communication in mobile ad hoc networks. 1079-1087 - Muhammad Rashid Ramzan, Muhammad Naeem, Omer Chughtai, Waleed Ejaz, Muhammad Altaf:
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach. 1088-1102 - Jianguo Sun, Wenshan Wang, Sizhao Li, Qingan Da, Lei Chen:
Scheduling optimization for UAV communication coverage using virtual force-based PSO model. 1103-1112 - Jiao Mao, Guoliang Xu, Lijun He, Jiangtao Luo:
Attention-relation network for mobile phone screen defect classification via a few samples. 1113-1120 - Guang Hua, Qingyi Wang, Dengpan Ye, Haijian Zhang, Guoyin Wang, Shuyin Xia:
Factors affecting forensic electric network frequency matching - A comprehensive study. 1121-1130 - Gaofei Huang, Qihong Zhong, Hui Zheng, Sai Zhao, Dong Tang:
Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes. 1131-1144 - Dandan Liu, Wei Wu, Liangqi Gui, Tao Jiang:
OAM mode purity improvement based on antenna array. 1145-1153 - Jianyi Zhang, Fangjiao Zhang, Qichao Jin, Zhiqiang Wang, Xiaodong Lin, Xiali Hei:
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning. 1154-1167 - Yin Long, Hang Ding, Simon Murphy:
Semi-supervised learning based hybrid beamforming under time-varying propagation environments. 1168-1177 - Marek Gajewski, Olgierd Hryniewicz, Agnieszka Jastrzebska, Mariusz Kozakiewicz, Karol R. Opara, Jan W. Owsinski, Slawomir Zadrozny, Tomasz Zwierzchowski:
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques. 1178-1188 - Jinxiang Liu, Xiaotao Zhang, Jun Yang, Huiping Yang:
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model. 1189-1197 - Wenwen Gong, Huiping Wu, Xiaokang Wang, Xuyun Zhang, Yawei Wang, Yifei Chen, Mohammad Reza Khosravi:
Diversified and compatible web APIs recommendation based on game theory in IoT. 1198-1209
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.