Search
Now showing items 151-160 of 167
Reliable Federated Learning for Mobile Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Federated learning, as a promising machine learning approach, has emerged to leverage a distributed personalized dataset from a number of nodes, for example, mobile devices, to improve performance while simultaneously ...
Enabling Efficient Coexistence of DSRC and C-V2X in Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Radio access technologies, such as C-V2X and DSRC, have been used to support robust communication in connected vehicles scenarios. However, existing studies mostly dealt with homogenous vehicular networks, where coexistence ...
An energy-balanced trust cloud migration scheme for underwater acoustic sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
As a candidate trust management scheme, trust models based on the cloud theory are always taken into account when detecting malicious attacks in Underwater Acoustic Sensor Networks (UASNs). To evaluate the trust values of ...
A Node Location Algorithm Based on Node Movement Prediction in Underwater Acoustic Sensor Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Aiming at the problems of the low mobility, low location accuracy, high communication overhead, and high energy consumption of sensor nodes in underwater acoustic sensor networks, the MPL (movement prediction location) ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...
Peak Extraction Passive Source Localization Using a Single Hydrophone in Shallow Water
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this work, we use the acoustic ray model to study passive source localization problems using a single hydrophone for shallow water waveguides. It has been found that conventional matched field processing, which requires ...
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ...
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...