Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 207, Issue CJul 2023
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
editorial
Review Articles
review-article
A survey on federated learning for security and privacy in healthcare applications
Abstract

Technological advances in smart devices and applications targeting the Internet of Healthcare Things provide a perfect environment for using Machine Learning-based techniques. However, traditional ML solutions operate on centralized ...

Regular Articles
research-article
Secure, accurate and privacy-aware fully decentralized learning via co-utility
Abstract

Fully decentralized learning is a setting in which each peer in a P2P network trains a machine learning model with the help of the other peers. Each peer acts as a model manager by periodically sending her current model to other peers, ...

research-article
Agile: A high-scalable and low-jitter flow tables lifecycle management framework for multi-core programmable data plane
Abstract

In software-defined networking (SDN), the common flow table updates have constrained its performance. The current southbound protocol determines neither the priority nor the method of flow table update, which could result in latency-...

research-article
Intelligent routing algorithm for wireless sensor networks dynamically guided by distributed neural networks
Abstract

Using reinforcement learning to adjust the power balance of sensor nodes dynamically is an essential approach for extending the lifetime of wireless sensor networks (WSNs), which makes sensor nodes adapt to changing environments by ...

research-article
Accurate compressed traffic detection via traffic analysis using Graph Convolutional Network based on graph structure feature
Abstract

As the application of data compression technology expands in areas such as IoT, webpage, and video data transmission, there are problems such as leakage of compressed but unencrypted user data, difficulty in supervising compressed data,...

research-article
Data Placement and Transmission Scheduling for coded multicast in mobile edge networks
Abstract

Edge caching is a promising strategy to reduce the traffic load in mobile core networks, by caching popular contents at the edge of mobile networks, e.g., base stations (BSs). For the BSs to transmit data to user equipment (UEs), coded ...

research-article
A crowd cooperative defense model for mitigating DDoS attacks in Mobile Crowdsensing networks
Abstract

Mobile Crowdsensing (MCS) is rapidly growing up while encountering severe security threats simultaneously. DDoS attacks tend to disrupt large-scale sensing tasks to the MCS and reduce the availability of MCS. However, the existing ...

research-article
Construction of FANETs for user coverage and information transmission in disaster rescue scenarios
Abstract

In this paper, we consider a flying ad hoc network (FANET) construction problem in a post-disaster scenario where ground users (GUs) lose contact with the outside world. The main objective of the FANET is to provide communication ...

Special Issue on Explainable and Interpretable AI for Next Generation Internet of Things
research-article
SANet: A novel segmented attention mechanism and multi-level information fusion network for 6D object pose estimation
Abstract

Reliably and rapidly estimating the 6D position of an object is a critical challenge when using Internet of Things (IoT) technologies for monitoring. Nowadays, the prevalent 6D pose estimation architecture is based on a two-stage ...

Special Issue on Trustworthy Artificial Intelligence in B5G/6G networks
research-article
A security-friendly privacy-preserving solution for federated learning
Abstract

Federated learning is a privacy-aware collaborative machine learning method where the clients collaborate on constructing a global model by performing local model training using their training data and sending the local model updates ...

Special Issue on Wireless Communication-based Solutions for Combating COVID-19 From the Game Theory Viewpoint
research-article
A game theory-based COVID-19 close contact detecting method with edge computing collaboration
Abstract

People all throughout the world have suffered from the COVID-19 pandemic. People can be infected after brief contact, so how to assess the risk of infection for everyone effectively is a tricky challenge. In view of this challenge, the ...

Special Issue on VSI: AI-over-UAV-Comm-Sys
research-article
AI-based energy-efficient path planning of multiple logistics UAVs in intelligent transportation systems
Abstract

In the context of Industry 5.0, artificial intelligence (AI)-based logistics Unmanned Aerial Vehicles (UAVs) have been widely applied in intelligent transportation systems due to their advantages of faster speed, lower cost, more ...

research-article
Efficient consensus algorithm based on improved DPoS in UAV-assisted mobile edge computing
Abstract

Aiming at the problems of low decentralization, low motivation for node voting, and malicious behavior of nodes for the traditional DPoS consensus mechanism in the blockchain-based UAV-assisted mobile edge computing environment, this ...

Special ISsue on Information Centric Wireless Communication with Edge Fog Computing for 5G and beyond IoT applications
research-article
f 2-ToF: A feature-alignment and frequency-division time-of-flight data denoise network
Abstract

Infrared wave time-of-flight (ToF) imaging is a important method to sense the 3D information of scene for Internet of Things (IoT) and artificial intelligent (AI). Driven by heavy demands from industry and users, ToF imaging has ...

Highlights

  • A feature-alignment frequency-division CNN mitigates multinoises of ToF data.
  • ...

Specisl Issue on Selected and Extended Papers from the 17th Wireless On-demand Network systems and Services Conference (WONS 2022)
research-article
Circular Time Shift Modulation for robust underwater acoustic communications in doubly spread channels
Abstract

Pulse Position Modulation (PPM) has shown great advantages by being non-coherently implementable. However, PPM suffers from the high multipath delay in underwater acoustic channels. To be robust against the doubly spread effects in ...

Comments