Search
Now showing items 51-60 of 103
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ...
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ...
Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Internet of Things (IoT) systems have been playing a significant role in improving the quality of various applications and services. With the expansion increase of loT devices and users, different Multiple Access (MA) ...
Artificial Intelligence Empowered QoS-Oriented Network Association for Next-Generation Mobile Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The increasing complexity and dynamics of 5G mobile networks have brought revolutionary changes in its modeling and control, where efficient routing and resource allocation strategies become beneficial. Software-Defined ...
Subchannel Assignment and Power Allocation for Time-Varying Fog Radio Access Network with NOMA
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
To satisfy future wireless network's requirements of huge capacity, ultra low delay and supermassive connectivity, it is urgent to study novel wireless communication network architecture and technology. Fog-computing radio ...
Machine unlearning: Its need and implementation strategies
(
Association for Computing Machinery
, 2021 , Conference Paper)
Generally when users share information about themselves on some online platforms, they knowingly or unknowingly allow this data to be used by the companies behind these companies for various purposes including selling this ...
Game Theory for Anti-Jamming Strategy in Multichannel Slow Fading IoT Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
Confidentiality and Timeliness of Data Dissemination in Platoon-based Vehicular Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Recent advances in inter-vehicle wireless communications allow for automated and coordinated vehicles' driving in platoon-based vehicular cyber-physical systems (PVCPS). This article presents a comprehensive low-latency ...
Two-Way MR-Forest Based Growing Path Classification for Malignancy Estimation of Pulmonary Nodules
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
This paper proposes a two-way multi-ringed forest (TMR-Forest) to estimating the malignancy of the pulmonary nodules for false positive reduction (FPR). Based on our previous work of deep decision framework, named MR-Forest, ...