College of Engineering: Recent submissions
Now showing items 3641-3660 of 8761
-
Budgeted online selection of candidate iot clients to participate in federated learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Machine learning (ML), and deep learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques, however, suffer from privacy and security concerns since data are collected from ... -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
( Elsevier B.V. , 2021 , Article)With the development of data processing technologies, efficiency of information processing in the Industrial Internet of Things (IIoT) is greatly improved. In this situation solving the following security problems of the ... -
Subchannel Assignment and Power Allocation for Time-Varying Fog Radio Access Network with NOMA
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)To satisfy future wireless network's requirements of huge capacity, ultra low delay and supermassive connectivity, it is urgent to study novel wireless communication network architecture and technology. Fog-computing radio ... -
An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV with Fog Computing Architecture
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The Internet of Vehicles (IoV) is one important application scenarios for the development of the Internet of things. The software-defined network (SDN) and fog computing could effectively improve the IoV network dynamics, ... -
SFPAG-R: A Reliable Routing Algorithm Based on Sealed First-Price Auction Games for Industrial Internet of Things Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Due to the harsh deployment environment of the Industrial Internet of Things, the reliability of data transmission has always been an important challenge and a hot topic in Industrial Internet of Things (IIoT). Based on a ... -
Secure Data Access Control with Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can efficiently control and manage the distributed energy resources (DERs). In smart grid, IoT devices generate huge amounts ... -
Protecting Your Shopping Preference with Differential Privacy
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Online banks may disclose consumers' shopping preferences due to various attacks. With differential privacy, each consumer can disturb his consumption amount locally before sending it to online banks. However, directly ... -
STAC: a spatio-temporal approximate method in data collection applications
( Elsevier B.V. , 2021 , Article)Wireless sensor networks (WSNs) and IoT are often deployed for long-term monitoring. However, the network lifetime of these applications is limited by non-rechargeable battery-powered. To vastly reduce energy consumption, ... -
Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Mobile-edge computing (MEC) has emerged as a new computing paradigm with great potential to alleviate resource limitations attributed to mobile device users (MDUs) by offloading intensive computations to ubiquitous MEC ... -
ECBCM: A prestige-based edge computing blockchain security consensus model
( John Wiley and Sons Inc , 2021 , Article)The explosive growth of data in the network has brought huge burdens and challenges to traditional centralized cloud computing data processing. To solve this problem, edge computing technology came into being. Because the ... -
IoT root union: A decentralized name resolving system for IoT based on blockchain
( Elsevier Ltd , 2021 , Article)A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ... -
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ... -
Modified QR-D and MMSE PMI selection technique for MIMO closed loop spatial multiplexing in LTE/LTE-advanced
(2013 , Conference)Limited feedback closed-loop spatial multiplexing evolved as an attractive technique during the development of Multi Input Multi Output (MIMO) in Long Term Evolution (LTE). Spatial multiplexing involves transmitting ... -
Joint interference cancellation and dirty paper coding for cognitive cellular networks
(2011 , Conference)Downlink communication in a cellular network with a cognitive (secondary) cell is considered. In our model, the base station of the cognitive cell knows the messages of the other cell non-causally. We propose a new ... -
Lifetime maximization with predictive power management in selective relay networks
( Institute of Electrical and Electronics Engineers Inc. , 2009 , Conference)A diversity scheme which exploits the existence of a source-destination path to improve the lifetime and outage probability of a wireless selective relay network with Amplifyand-Forward (AF) relays is proposed and studied. ... -
Maximum throughput of a cooperative energy harvesting cognitive radio user
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain ... -
Long mmWave Backhaul Connectivity Using Fixed-Wing UAVs
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference)This paper discusses the analysis of a fixed wing unmanned aerial vehicle (UAV)-based millimeter wave (mmWave) backhaul link, that is offered as a cost effective and easy to deploy solution to connect a disaster or remote ... -
Maximum throughput of a secondary user cooperating with an energy-aware primary user
( IEEE Computer Society , 2014 , Conference)This paper proposes a cooperation protocol between a secondary user (SU) and a primary user (PU) which dedicates a free frequency subband for the SU if cooperation results in energy saving. Time is slotted and users are ... -
Interference cancellation through interference alignment for downlink of cognitive cellular networks
( Institution of Engineering and Technology , 2015 , Article)Interference cancellation through interference alignment (IA) at the downlink of cognitive cellular networks is proposed. IA helps the spatial resources to be shared among primary and secondary cells, and thus it can provide ... -
Lifetime maximization for greedy selective relay strategies
(2009 , Conference)In this paper we propose a new algorithm for selective relay strategies with Amplify-and-Forward (AF) relays which improves the relay network lifetime. The lifetime of the relay network is defined as the maximum number of ...