Search
Now showing items 1-10 of 26
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
(
Elsevier B.V.
, 2021 , Article)
Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ...
Trust-Based Cloud Machine Learning Model Selection for Industrial IoT and Smart City Services
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
With machine learning (ML) services now used in a number of mission-critical human-facing domains, ensuring the integrity and trustworthiness of ML models becomes all important. In this work, we consider the paradigm where ...
A method of chained recommendation for charging piles in internet of vehicles
(
Springer
, 2021 , Article)
With the popularization of new energy electric vehicles (EVs), the recommendation algorithm is widely used in the relatively new field of charge piles. At the same time, the construction of charging infrastructure is facing ...
Guest editorial: Special issue on enabling massive iot with 6g: Applications, architectures, challenges, and research directions
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Driven by the Internet-of-Things (IoT)-enabled massively data-intensive applications, such as virtual-augmented-reality-based gaming, ultramassive machine-type communications, holographic rendering and high-precision ...
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
3D Beamforming Based on Deep Learning for Secure Communication in 5G and beyond Wireless Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference)
Three-dimensional (3D) beamforming is a potential technique to enhance communication security of new generation networks such as 5G and beyond. However, it is difficult to achieve optimal beamforming due to the challenges ...
Federated Learning for Energy-balanced Client Selection in Mobile Edge Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference)
Mobile edge computing (MEC) has been considered as a promising technology to provide seamless integration of multiple application services. Federated learning (FL) is carried out at edge clients in MEC for privacy-preserving ...
Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural ...
A survey of cyber-physical attacks and detection methods in smart water distribution systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Modern technologies empower water distribution systems (WDS) for better services in the processes of water supply, storage, distribution, and recycling. They improve real-time monitoring, automating, and managing. However, ...
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
(
IEEE Computer Society
, 2021 , Article)
5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...