Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Pinning event-triggered sampled-data synchronization of coupled reaction–diffusion neural networks
AbstractIn this paper, the synchronization problem of coupled reaction–diffusion neural networks (CRDNNs) is considered by using pinning event-triggered sampled-data (PETSD) control method under spatially point measurements. To save the limited ...
- research-articleSeptember 2024
ISAC-Aided UAV Swarms: From Networked Perception to Capability Evolution
IEEE Communications Magazine (COMAG), Volume 62, Issue 9Pages 60–66https://doi.org/10.1109/MCOM.001.2300652With the advancement of technology, intelligent unmanned aerial vehicle swarms (UAV-S) are playing an increasingly significant role across various industries, and sensing is one of their key capabilities that enable UAV-S to operate more effectively in ...
- research-articleAugust 2024
Joint Task Offloading and Content Caching for NOMA-Aided Cloud-Edge-Terminal Cooperation Networks
IEEE Transactions on Wireless Communications (TWC), Volume 23, Issue 10_Part_3Pages 15586–15600https://doi.org/10.1109/TWC.2024.3432150To satisfy the requirements of content distribution in computation-intensive and delay-sensitive services, this paper presents a novel joint task offloading and content caching (JTOCC) scheme in multi-cell multi-carrier non-orthogonal multiple-access (...
- research-articleAugust 2024
Leveraging Blockchain Based Federated Learning for Trustworthy 6G IoMT Image Analysis
IEEE Wireless Communications (IEEEWIRCOM), Volume 31, Issue 4Pages 192–198https://doi.org/10.1109/MWC.013.2300518Remote healthcare has been an important application of 6G and is increasingly attracting attention. In the field of medical image analysis, federated learning (FL) is widely considered for medical data collected by Internet of medical things (loMT) ...
- research-articleJuly 2024
Fuzzy Boundary Sampled-Data Control for Nonlinear DPSs With Random Time-Varying Delays
IEEE Transactions on Fuzzy Systems (TOFS), Volume 32, Issue 10Pages 5872–5885https://doi.org/10.1109/TFUZZ.2024.3432795This article introduces a fuzzy boundary sampled-data (SD) control approach for a nonlinear distributed parameter system (DPS) with random time-varying delay, which belongs to two intervals and is considered by a probabilistic way to take the influence of ...
-
- research-articleJuly 2024
Partial and cost-minimized computation offloading in hybrid edge and cloud systems
Expert Systems with Applications: An International Journal (EXWA), Volume 250, Issue Chttps://doi.org/10.1016/j.eswa.2024.123896AbstractNowadays, numerous mobile devices (MDs) provide nearly anytime and anywhere services, running on top of various computation-intensive applications. However, bearing limited battery, bandwidth, computing, and storage resources, MDs cannot ...
Highlights- A hybrid system architecture is designed and characterized by triple queueing models.
- A constrained total cost minimization problem with multiple constraints is formulated.
- The cost minimization problem is solved by a hybrid ...
- research-articleJuly 2024
Improved network intrusion classification with attention-assisted bidirectional LSTM and optimized sparse contractive autoencoders▪
Expert Systems with Applications: An International Journal (EXWA), Volume 244, Issue Chttps://doi.org/10.1016/j.eswa.2023.122966AbstractAccurately identifying network intrusion cannot only help individuals and enterprises better deal with network security problems, but also maintain the Internet environment. This work proposes a new hybrid classification method named SABD for ...
Graphical abstractDisplay Omitted
Highlights- A hybrid method named SABD is given for network intrusion detection.
- It uses stacked sparse contractive autoencoders to extract features in data.
- It uses an attention-based bidirectional LSTM to realize the classification.
- It ...
- research-articleJune 2024
VeriPrune: Equivalence verification of node pruned neural network
AbstractNeural network compression is a widely used technique when deploying the neural network in energy-constrained and computation-constrained devices. To guarantee the compressed neural network is still usable without too much accuracy loss, the ...
Graphical abstractDisplay Omitted
- research-articleJuly 2024
Robotic assembly line balancing considering the carbon footprint objective with cross-station design
Computers and Industrial Engineering (CINE), Volume 190, Issue Chttps://doi.org/10.1016/j.cie.2024.110045AbstractRobotic assembly lines are widely applied in the manufacturing sector to produce a wide range of products because of their efficiency and multifunctionality. The robotic assembly line balancing problem (RALBP) is a combinatorial optimization ...
Highlights- A robotic assembly line balancing problem with carbon footprint objective.
- The carbon footprint is computed by the electricity consumption of robots.
- Cross-station design is used to reduce the carbon footprint.
- A particle swarm ...
- research-articleFebruary 2024
Accurate water quality prediction with attention-based bidirectional LSTM and encoder–decoder
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PChttps://doi.org/10.1016/j.eswa.2023.121807AbstractAccurate prediction of water quality indicators can effectively predict sudden water pollution events and reveal them to water users for reducing the impact of water quality pollution. Neural networks, e.g., Long Short-Term Memory (LSTM) and ...
Highlights- A hybrid prediction method VBAED is designed to predict water quality time series.
- VBAED combines VMD, bidirectional input attention, encoder–decoder, and BiLSTM.
- It uses bidirectional input attention to add weights to features in ...
- research-articleFebruary 2024
Fuzzy Fault-Tolerant Boundary Control for Nonlinear DPSs With Multiple Delays and Stochastic Actuator Failures
IEEE Transactions on Fuzzy Systems (TOFS), Volume 32, Issue 5Pages 3121–3131https://doi.org/10.1109/TFUZZ.2024.3367870For nonlinear distributed parameter systems (DPSs) with multiple delays, this study considers a fuzzy fault-tolerant boundary control (BC) with stochastic actuator failures under boundary measurement. First, we exactly represent the nonlinear DPS with ...
- research-articleMarch 2024
Language model as an Annotator: Unsupervised context-aware quality phrase generation
AbstractPhrase mining is a fundamental text mining task that aims to identify quality phrases from context. Nevertheless, the scarcity of extensive gold labels datasets, demanding substantial annotation efforts from experts, renders this task ...
- research-articleJanuary 2024
Hybrid network attack prediction with Savitzky–Golay filter-assisted informer▪
Expert Systems with Applications: An International Journal (EXWA), Volume 235, Issue Chttps://doi.org/10.1016/j.eswa.2023.121126AbstractDue to the emergence of new network attack technologies, cloud manufacturing platforms may be subject to various network attacks at any time. Traditional network attack prediction aims to predict the upcoming types of network attacks with ...
Graphical abstractDisplay Omitted
Highlights- A hybrid network attack detection method is given for a cloud manufacturing platform.
- It adopts a Savitzky–Golay filter for data smoothing and noise elimination.
- It adopts a self-attention mechanism of an encoder to reduce network ...
- review-articleDecember 2023
Production logistics digital twins: Research profiling, application, challenges and opportunities
Robotics and Computer-Integrated Manufacturing (RCIM), Volume 84, Issue Chttps://doi.org/10.1016/j.rcim.2023.102592AbstractIn the era of Industry 4.0, Production Logistic Digital Twins (PLDTs) have garnered remarkable attention from both academic and industrial communities. This is evident from the growing number of research publications on PLDTs in ...
- research-articleNovember 2023
A Security Evaluation Framework for Intelligent Connected Vehicles Based on Attack Chains
IEEE Network: The Magazine of Global Internetworking (IEEENETW), Volume 38, Issue 2Pages 148–155https://doi.org/10.1109/MNET.2023.3333545With the rapid development of intelligent connected vehicles (ICVs), their intelligent, remote, and high-speed mobility characteristics have led to an expansion of their attack surface, and thus an increase in security requirements. Consequently, security ...
- research-articleNovember 2023
Synchronization of reaction–diffusion neural networks with random time-varying delay via intermittent boundary control
AbstractUnder boundary measurement (BM), this paper solves the synchronization problem via intermittent boundary proportional–derivative (PD) control of delayed reaction–diffusion neural networks (RDNNs), where the random time-varying delay (...
- research-articleOctober 2023
Toward Throughput Maximization of Integrated Sensing and Communications Enabled Predictive Beamforming for 6G
IEEE Network: The Magazine of Global Internetworking (IEEENETW), Volume 38, Issue 4Pages 292–300https://doi.org/10.1109/MNET.2023.3326067To meet the requirements of ubiquitous connectivity, the sixth-generation (6G) is expected to support higher frequencies such as millimeter waves and terahertz, as well as high-mobility scenarios like unmanned aerial vehicles and vehicular networks. ...
- research-articleDecember 2023
RM2MS: A Tool for Automatic Identification of Microservices from Requirements Models
2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)Pages 50–54https://doi.org/10.1109/MODELS-C59198.2023.00018Microservices identification is the key development process of cloud-native applications. It focuses on decomposing system into decoupling autonomous components to support development and deployment independently. This process requires sophisticated human ...
- research-articleDecember 2023
RapidMS: A Tool for Supporting Rapid Microservices Generation and Refinement from Requirements Model
2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)Pages 45–49https://doi.org/10.1109/MODELS-C59198.2023.00017Microservices is a crucial architecture design pat-tern for developing cloud-native applications, which focuses on decomposing a large and complex software system into autonomous components that can be independently developed and deployed. However, ...
- research-articleSeptember 2023
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things
- Chunchi Liu,
- Minghui Xu,
- Hechuan Guo,
- Xiuzhen Cheng,
- Yinhao Xiao,
- Dongxiao Yu,
- Bei Gong,
- Arkady Yerukhimovich,
- Shengling Wang,
- Weifeng Lyu
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 5Pages 6133–6148https://doi.org/10.1109/TMC.2023.3316622<italic>Overprivilege Attack</italic>, a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this paper, we propose TBAC, a Tokoin-Based Access Control model enabled ...