Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 23, Issue 8Aug. 2024
Publisher:
  • IEEE Educational Activities Department
  • 445 Hoes Lane P.O. Box 1331 Piscataway, NJ
  • United States
ISSN:1536-1233
Reflects downloads up to 09 Nov 2024Bibliometrics
research-article
Deployment Cost-Aware UAV and BS Collaboration in Cell-Free Integrated Aerial-Terrestrial Networks

To enable massive connectivity and connecting the unconnected, aerial communications are becoming critical to complement with the terrestrial infrastructure. Integrated aerial-terrestrial network (IATN) offers both line-of-sight (LoS) and non-LoS (NLoS) ...

research-article
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation

In many mobile applications, user-generated data are presented as set-valued data. To tackle potential privacy threats in analyzing these valuable data, local differential privacy has been attracting substantial attention. However, existing approaches ...

research-article
Group Task Recommendation in Mobile Crowdsensing: An Attention-Based Neural Collaborative Approach

Collaborative tasks often require the cooperation of multiple individuals to be completed in mobile crowdsensing (MCS). However, previous task recommendations predominantly focused on individuals rather than groups, making them less effective for ...

research-article
Self-Supervised MAFENN for Classifying Low-Labeled Distorted Images Over Mobile Fading Channels

Image distortion during wireless transmission presents a significant challenge for real-world artificial intelligence (AI) applications. Recent methods have attempted to address this issue by integrating neural networks into the wireless transmission ...

research-article
Blockchain-Secured Task Offloading and Resource Allocation for Cloud-Edge-End Cooperative Networks

Enhanced by blockchain and cloud-edge-end cooperation, an edge computing network is capable to provide IoT (Internet of Things) devices higher task processing performance and better security and privacy guarantee. However, the joint resource management ...

research-article
Taming Serverless Cold Start of Cloud Model Inference With Edge Computing

Serverless computing is envisioned as the de-facto standard for next-generation cloud computing. However, the cold start dilemma has impeded its adoption by delay-sensitive and burst applications. In this paper, we propose to tame serverless cold start in ...

research-article
Energy Efficient Task Offloading and Resource Allocation in Air-Ground Integrated MEC Systems: A Distributed Online Approach

In many remote areas lacking ground communication infrastructure support, such as wilderness, desert, ocean, etc., an integrated edge computing network in the air with edge computing nodes is an effective solution. It can provide over-the-air computing ...

research-article
Cooperative Deep Reinforcement Learning Enabled Power Allocation for Packet Duplication URLLC in Multi-Connectivity Vehicular Networks

Ultra reliable low latency communication (URLLC) in vehicular networks is crucial for safety-related vehicular applications. Mini-slot with a short packet that carries only a few symbols is used to reduce the transmission time interval and enable quick ...

research-article
Adaptive Swarm Intelligent Offloading Based on Digital Twin-assisted Prediction in VEC

Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC). In VEC, task offloading enables vehicles to offload computing tasks to nearby Roadside Units (RSUs), thereby reducing the computation cost. Recent trends in task ...

research-article
Time-Constrained Actor-Critic Reinforcement Learning for Concurrent Order Dispatch in On-Demand Delivery

On-demand delivery has experienced rapid growth in recent years, revolutionizing people&#x0027;s lifestyles with its timeliness and convenience. The order dispatch process in on-demand delivery is <italic>concurrent</italic>, wherein couriers continuously ...

research-article
Accuracy-Aware Cooperative Sensing and Computing for Connected Autonomous Vehicles

To maintain high perception performance among connected and autonomous vehicles (CAVs), in this paper, we propose an accuracy-aware and resource-efficient raw-level cooperative sensing and computing scheme among CAVs and road-side infrastructure. The ...

research-article
AdaPyramid: Adaptive Pyramid for Accelerating High-Resolution Object Detection on Edge Devices

Deep convolutional neural network (NN)-based object detectors are not appropriate for straightforward inference on high-resolution videos at edge devices, as maintaining high accuracy often brings about prohibitively long latency. Although existing ...

research-article
Time-Slotted Task Offloading and Resource Allocation for Cloud-Edge-End Cooperative Computing Networks

In time-slotted edge computing systems, task scheduling is conducted at the end of each time slot to make task offloading decisions and resource allocation for all the tasks pending for scheduling during the time slot. However, the existing works omitted ...

research-article
Federated Learning With Sparsified Model Perturbation: Improving Accuracy Under Client-Level Differential Privacy

Federated learning (FL) that enables edge devices to collaboratively learn a shared model while keeping their training data locally has received great attention recently and can protect privacy in comparison with the traditional centralized learning ...

research-article
Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability

As location data have been increasingly adopted in location-based advertising (LBA), revealing locations to untrusted service providers has raised severe privacy concerns. Recent studies propose obfuscation mechanisms built upon geo-indistinguishability (...

research-article
DOFMS: DRL-Based Out-of-Order Friendly Multipath Scheduling in Mobile Heterogeneous Networks

Multipath transmission brings strong bandwidth aggregation capability for services in wireless networks. Nonetheless, the heterogeneous nature of paths and the motion of terminals results in varying transmission delays, leading to out-of-order (OFO) ...

research-article
Open Access
Enabling Cross-Technology Coexistence for ZigBee Devices Through Payload Encoding

With the rapid growth of Internet of Things, the number of heterogeneous wireless devices working in the same frequency band increases dramatically, leading to severe cross-technology interference. To enable coexistence, researchers have proposed a large ...

research-article
ShuttleBus: Dense Packet Assembling With QUIC Stream Multiplexing for Massive IoT

In this paper, we investigate dense short packet forwarding for clustering-based massive Internet-of-Things (mIoT). The objective is to support the data forwarding with minimal communication overhead while satisfying the differentiated latency constraints ...

research-article
L3Geocast: Enabling P4-Based Customizable Network-Layer Geocast at the Network Edge

Geocast is a one-to-many communication paradigm that enables the transmission of data packets to a designated area rather than an IP address. The most common geocast solutions rely on the application-layer Geolocation-to-IP database. But these IP-based ...

research-article
EgoMUIL: Enhancing Spatio-Temporal User Identity Linkage in Location-Based Social Networks With Ego-Mo Hypergraph

Users tend to own multiple accounts on different location-based social network (LBSN) platforms, and they typically engage with diverse social circles on each platform within the same locations. Consequently, linking these accounts across separate ...

research-article
Caching User-Generated Content in Distributed Autonomous Networks via Contextual Bandit

The escalating proliferation of user generated contents such as videos and images are dominating the network traffic. The optimal strategy for mitigating backbone congestion and minimizing user request latency lies in prudent caching at edge stations ...

research-article
The Power of Precision: High-Resolution Backscatter Frequency Drift in RFID Identification

Physical-layer identification uses manufacturing variations to create unique identifiers for each device. A decade ago, this concept was applied to RFID tags using backscatter frequency drift (BFD), a specific kind of &#x2018;fingerprint&#x2019; ...

research-article
Extending Beacon Lifetime by Predicting User Occupancy Using Deep Neural Networks

Bluetooth Low Energy (BLE) beacon network is one of the essential infrastructures for many IoT and smart city applications. However, the BLE beacon network usually suffers from poor reliability and high maintenance costs due to the short-lived battery ...

research-article
Supporting Flexible and Transparent User Interface Distribution Across Mobile Devices

The growing trend of multi-device ownerships creates opportunities to use applications across devices. However, the current methods of app development/usage remain in the single-device paradigm, which is far below user expectations. For example, it is ...

research-article
To Save Mobile Crowdsourcing From Cheap-Talk: A Game Theoretic Learning Approach

Today mobile crowdsourcing platforms invite users to provide anonymous reviews about service experiences, yet many reviews are found biased to be extremely positive or negative. The existing methods find it difficult to learn from biased reviews to infer ...

research-article
Lightweight Searchable and Equality-Testable Certificateless Authenticated Encryption for Encrypted Cloud Data

Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal with the problem of multi-public-key encrypted data computing. It can be used to verify if different ciphertexts are encryptions of same plaintext under different public ...

research-article
Robust WiFi Respiration Sensing in the Presence of Interfering Individual

WiFi-based respiration sensing technology has gained increasing attention due to its contactless sensing capabilities and utilization of existing WiFi devices. However, existing studies are limited to certain scenarios without addressing the motion ...

research-article
CDFi: Cross-Domain Action Recognition Using WiFi Signals

Contactless WiFi based human action recognition exhibits remarkable prospects in the fields such as human-computer interaction and smart home. However, domain dependency restricts its generalization into the real-world deployment. Since it is expensive to ...

research-article
Semantics-Enhanced Temporal Graph Networks for Content Popularity Prediction

The surging demand for high-definition video streaming services and large neural network models implies a tremendous explosion of Internet traffic. To mitigate the traffic pressure, architectures with in-network storage have been proposed to cache popular ...

research-article
EarSSR: Silent Speech Recognition via Earphones

As the most natural and convenient way to communicate with people, speech is always preferred in Human-Computer Interactions. However, voice-based interaction still has several limitations. It raises privacy concerns in some circumstances and the accuracy ...

Comments