Search
Now showing items 1-10 of 20
A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network
(
MDPI
, 2020 , Article)
Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ...
An incentive mechanism for data sharing based on blockchain with smart contracts
(
Elsevier
, 2020 , Article)
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ...
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
(
Association for Computing Machinery
, 2022 , Article)
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ...
A Practical Cross Device Federated Learning Frame-work over 5G N etworks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The concept of federated learning (FL) was first proposed by Google in 2016. Thereafter, FL has been widely studied for the feasibility of application in various fields due to its potential to make full use of data without ...
Epidemic Risk Assessment by a Novel Communication Station Based Method
(
IEEE Computer Society
, 2022 , Article)
The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually ...
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ...
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
(
Academic Press Inc.
, 2021 , Article)
HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ...
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense
(
IEEE Computer Society
, 2021 , Other)
5G and beyond (B5G) networks are leading a digital revolution in telecommunication in both academia and industry. It brings new paradigms in many aspects of people's daily lives due to its advantages. However, it still ...
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC
(
Elsevier B.V.
, 2021 , Article)
Mission-critical communication (MCC) is one of the main goals in 5G, which can leverage multiple device-to-device (D2D) connections to enhance reliability for mission-critical communication. In MCC, D2D users can reuses ...
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...