Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyJanuary 2025JUST ACCEPTED
Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications
- Tong Li,
- Qingyue Long,
- Haoye Chai,
- Shiyuan Zhang,
- Fenyu Jiang,
- Haoqiang Liu,
- Wenzhen Huang,
- Depeng Jin,
- Yong Li
The rapid advancement of mobile networks highlights the limitations of traditional network planning and optimization methods, particularly in modeling, evaluation, and application. Network Digital Twins, which simulate networks in the digital domain for ...
- surveyJanuary 2025JUST ACCEPTED
Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities
Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles’ drivers. Despite the useful features of VANETs, there are some ...
- surveyOctober 2024
Time-Sensitive Networking (TSN) for Industrial Automation: Current Advances and Future Directions
ACM Computing Surveys (CSUR), Volume 57, Issue 2Article No.: 30, Pages 1–38https://doi.org/10.1145/3695248With the introduction of Cyber-Physical Systems (CPS) and Internet of Things (IoT) technologies, the automation industry is undergoing significant changes, particularly in improving production efficiency and reducing maintenance costs. Industrial ...
- surveyOctober 2024
A Partial Offline Payment System for Connecting the Unconnected Using Internet of Things: A Survey
ACM Computing Surveys (CSUR), Volume 57, Issue 2Article No.: 31, Pages 1–35https://doi.org/10.1145/3687132The digital revolution in finance has bypassed many in rural areas due to limited access to technology and infrastructure. While real-time Internet banking is not feasible, a new approach is needed to create a secure, low-cost banking ecosystem for these ...
- surveyMay 2024
Integration of Sensing, Communication, and Computing for Metaverse: A Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 10Article No.: 245, Pages 1–38https://doi.org/10.1145/3659946The metaverse is an Artificial Intelligence (AI)-generated virtual world, in which people can game, work, learn, and socialize. The realization of metaverse not only requires a large amount of computing resources to realize the rendering of the virtual ...
-
- surveyJanuary 2024
Scaling Blockchains with Error Correction Codes: A Survey on Coded Blockchains
ACM Computing Surveys (CSUR), Volume 56, Issue 6Article No.: 139, Pages 1–33https://doi.org/10.1145/3637224A fundamental issue in blockchain systems is their scalability in terms of data storage, computation, communication, and security. To resolve this issue, a promising research direction is coding theory, which is widely used for distributed storage, ...
- surveyJanuary 2024
Surveying Emerging Network Approaches for Military Command and Control Systems
- João Eduardo Costa Gomes,
- Ricardo Rodrigues Ehlert,
- Rodrigo Murillo Boesche,
- Vinicius Santosde Lima,
- Jorgito Matiuzzi Stocchero,
- Dante A. C. Barone,
- JulianoAraujo Wickboldt,
- Edison Pignaton de Freitas,
- Julio C. S. dos Anjos,
- Ricardo Queiroz de Araujo Fernandes
ACM Computing Surveys (CSUR), Volume 56, Issue 6Article No.: 143, Pages 1–38https://doi.org/10.1145/3626090This survey paper examines emerging network approaches for military Command and Control (C2) systems. An extensive literature review is provided along the text on network-centric C2 systems. Also, it provides a comprehensive analysis of the paradigm based ...
- surveyOctober 2023
A Survey on the Unmanned Aircraft System Traffic Management
ACM Computing Surveys (CSUR), Volume 56, Issue 3Article No.: 68, Pages 1–37https://doi.org/10.1145/3617992The Unmanned Aircraft System Traffic Management (UTM) system is a set of services offering an automated management of the airspace and thus providing safe and secure Unmanned Aerial Vehicle (UAV) flights in both controlled and uncontrolled airspace. ...
- surveySeptember 2023
Where Are the (Cellular) Data?
ACM Computing Surveys (CSUR), Volume 56, Issue 2Article No.: 48, Pages 1–25https://doi.org/10.1145/3610402New generations of cellular networks are data oriented, targeting the integration of machine learning and artificial intelligence solutions. Data availability, required to train and compare machine learning based networking solutions, is therefore ...
- surveySeptember 2023
Service Caching and Computation Reuse Strategies at the Edge: A Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 2Article No.: 43, Pages 1–38https://doi.org/10.1145/3609504With the proliferation of connected devices including smartphones, novel network connectivity and management methods are needed to meet user Quality of Experience (QoE) and computational demands of contemporary applications. Service caching and ...
- surveySeptember 2023
Soft Delivery: Survey on a New Paradigm for Wireless and Mobile Multimedia Streaming
ACM Computing Surveys (CSUR), Volume 56, Issue 2Article No.: 33, Pages 1–37https://doi.org/10.1145/3607139The increasing demand for video streaming services is the key driver of modern wireless and mobile communications. Although many studies have designed digital-based delivery schemes to send video content over wireless and mobile networks, significant ...
- surveyAugust 2023
Mobile Edge Computing and Machine Learning in the Internet of Unmanned Aerial Vehicles: A Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 1Article No.: 13, Pages 1–31https://doi.org/10.1145/3604933Unmanned Aerial Vehicles (UAVs) play an important role in the Internet of Things and form the paradigm of the Internet of UAVs, due to their characteristics of flexibility, mobility, and low costs. However, resource constraints such as dynamic wireless ...
- surveyJuly 2023
Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 308, Pages 1–69https://doi.org/10.1145/3578581Centralized networks inevitably exhibit single points of failure that malicious actors regularly target. Decentralized networks are more resilient if numerous participants contribute to the network’s functionality. Most decentralized networks employ ...
- surveyJuly 2023
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 331, Pages 1–37https://doi.org/10.1145/3592797The modern electric power grid, known as the Smart Grid, has fast transformed the isolated and centrally controlled power system to a fast and massively connected cyber-physical system that benefits from the revolutions happening in communications (such ...
- surveyJuly 2023
Device Fingerprinting for Cyber-Physical Systems: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 302, Pages 1–41https://doi.org/10.1145/3584944The continued growth of the cyber-physical system (CPS) and Internet of Things technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprint/fingerprinting (DFP) is ...
- surveyJanuary 2023
A Survey of Security and Privacy Issues in V2X Communication Systems
- Takahito Yoshizawa,
- Dave Singelée,
- Jan Tobias Muehlberg,
- Stephane Delbruel,
- Amir Taherkordi,
- Danny Hughes,
- Bart Preneel
ACM Computing Surveys (CSUR), Volume 55, Issue 9Article No.: 185, Pages 1–36https://doi.org/10.1145/3558052Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of global road vehicle exports coming from the European Union (EU), and ...
- surveyDecember 2022
Heterogeneous Network Access and Fusion in Smart Factory: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 6Article No.: 113, Pages 1–31https://doi.org/10.1145/3530815With the continuous expansion of the Industrial Internet of Things (IIoT) and the increasing connectivity among the various intelligent devices or systems, the control of access and fusion in smart factory networks has significantly gained importance. ...
- surveyDecember 2022
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
ACM Computing Surveys (CSUR), Volume 55, Issue 5Article No.: 105, Pages 1–37https://doi.org/10.1145/3530812Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely used against cyber threats in IoT networks with promising performance. An ...
- surveyDecember 2022
Cross-Technology Communication for the Internet of Things: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 5Article No.: 89, Pages 1–29https://doi.org/10.1145/3530049The ever-developing Internet of Things (IoT) brings the prosperity of wireless sensing and control applications. In many scenarios, different wireless technologies coexist in the shared frequency medium as well as the physical space. Such wireless ...
- surveyNovember 2022
A Survey on Requirements of Future Intelligent Networks: Solutions and Future Research Directions
ACM Computing Surveys (CSUR), Volume 55, Issue 4Article No.: 73, Pages 1–61https://doi.org/10.1145/3524106The context of this study examines the requirements of Future Intelligent Networks (FIN), solutions, and current research directions through a survey technique. The background of this study is hinged on the applications of Machine Learning (ML) in the ...