بحث بسيط
السجلات المعروضة 31 -- 40 من 290
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System
(
IEEE Computer Society
, 2022 , Article)
The rapid growth of Android smart phones and abundant applications (Apps), a new security solution for distributed computing and mobile communications, has prompted many enhanced vendors to use different methods to effectively ...
A Demand-Driven Incremental Deployment Strategy for Edge Computing in IoT Network
(
IEEE Computer Society
, 2022 , Article)
Edge Computing brings great opportunities to enable the Internet of Things (IoT) vision. But the physical edge server deployment problem still poses a major challenge, which dramatically affects the service ability and ...
On Softwarization of Intelligence in 6G Networks for Ultra-Fast Optimal Policy Selection: Challenges and Opportunities
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The emerging Sixth Generation (6G) communication networks promising 100 to 1000 Gbps rates and ultra-low latency (1 millisecond) are anticipated to have native, embedded Artificial Intelligence (AI) capability to support ...
Improve the reliability of 6G vehicular communication through skip network coding
(
Elsevier Inc.
, 2022 , Article)
One important design goal of 6G networks is adapting to complex heterogeneous scenarios and providing a stable and reliable transmission channel for specific applications such as vehicular communication. To achieve this, ...
On Designing Smart Agents for Service Provisioning in Blockchain-Powered Systems
(
IEEE Computer Society
, 2022 , Article)
Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users' Quality of Experience (QoE) and the operation cost endured by providers. These ...
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
(
IEEE Computer Society
, 2022 , Article)
With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph
(
IEEE Computer Society
, 2022 , Article)
With the rapid development of programming platforms, how to utilize the tremendous amount of data produced by the platforms, such as Scatch, has been a big challenge to researchers. The growing data is not only huge, but ...
Deep Reinforcement Learning for Network Selection over Heterogeneous Health Systems
(
IEEE Computer Society
, 2022 , Article)
Smart health systems improve our quality oflife by integrating diverse information and technologies into health and medical practices. Such technologies can significantly improve the existing health services. However, ...
Epidemic Risk Assessment by a Novel Communication Station Based Method
(
IEEE Computer Society
, 2022 , Article)
The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ...
Game Theory for Anti-Jamming Strategy in Multichannel Slow Fading IoT Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most ...