Computer Science & Engineering: Recent submissions
Now showing items 981-1000 of 2402
-
Multidata-Owner Searchable Encryption Scheme over Medical Cloud Data with Efficient Access Control
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Several schemes have been proposed to enable cloud servers to search encrypted medical data to preserve patients' privacy. However, the existing schemes use inefficient attribute-based encryption (ABE) approaches for access ... -
Res6Edge: An Edge-AI Enabled Resource Sharing Scheme for C-V2X Communications towards 60
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The paper proposes a sixth-generation (6G)-enabled cellular vehicle-to-anything (C-V2X)-based scheme, ResóEdge, that supports high-data ingestion rate through artificial intelligence (AI) models at edge nodes, or Edge-AI. ... -
AI-based Intrusion Detection for Intelligence Internet of Vehicles
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)With the development of intelligent technologies, Internet of Things (IoT) opens up a new era in the field of automotive networks, namely Internet of Vehicles (IoV). The main goal of IoV is to provide a secure and reliable ... -
AI-enabled remote monitoring of vital signs for COVID-19: methods, prospects and challenges
( Springer , 2021 , Article)The COVID-19 pandemic has overwhelmed the existing healthcare infrastructure in many parts of the world. Healthcare professionals are not only over-burdened but also at a high risk of nosocomial transmission from COVID-19 ... -
Blockchain and Learning-Based Computation Offloading in Space-Assisted Power IoT
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Power systems impose stringent security and delay requirements on computation offloading, which cannot be satisfied by existing PIoT. In this paper, we address this challenge by combining blockchain and machine learning. ... -
Block6Tel: Blockchain-based Spectrum Allocation Scheme in 60-envisioned Communications
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The 6G-based spectrum bands allocation to telecom providers would guarantee ultra peak rates, high availability, and extremely low-latency for various user applications. However, the spectrum allocation still suffers from ... -
Asynchronous Federated Learning-based ECG Analysis for Arrhythmia Detection
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)With the rapid elevation of technologies such as the Internet of Things (IoT) and Artificial Intelligence (AI), the traditional cloud analytics-based approach is not suitable for a long time and secure health monitoring ... -
Deep Federated Learning for IoT-based Decentralized Healthcare Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Recent trends in the healthcare industry, such as the use of wearable IoT for continuous health monitoring, are setting new requirements for healthcare systems that boost data analysis. These systems should support ... -
Federated Learning for Energy-balanced Client Selection in Mobile Edge Computing
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Mobile edge computing (MEC) has been considered as a promising technology to provide seamless integration of multiple application services. Federated learning (FL) is carried out at edge clients in MEC for privacy-preserving ... -
Spatiotemporal Location Differential Privacy for Sparse Mobile Crowdsensing
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)مSparse Mobile Crowdsensing (SparseMCS) has become an efficient method for collecting and inferring sensor data at the urban scale, attracting many researchers' attention. However, there is a risk of location privacy being ... -
Graph Mapping Offloading Model Based On Deep Reinforcement Learning With Dependent Task
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In order to solve the problem of task offloading with dependent subtasks in mobile edge computing (MEC), we propose a graph mapping offloading model based on deep reinforcement learning (DRL). We model the user's computing ... -
Forced spectrum access termination probability analysis under restricted channel handoff
(2012 , Conference Paper)Most existing works on cognitive radio networks assume that cognitive (or secondary) users are capable of switching/jumping to any available channel, regardless of the frequency gap between the target and the current ... -
Secure service provision in smart grid communications
(2012 , Article)The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ... -
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ... -
A novel P2P VoD streaming technique integrating localization and congestion awareness strategies
(2012 , Conference Paper)The concept of the "future Internet" has evolved amongst researchers recently to relieve the tremendous pressure on the current Internet infrastructure to support the heterogeneous networking technologies, mobile devices, ... -
Impact of channel estimation error on bidirectional MABC-AF relaying with asymmetric traffic requirements
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)Channel estimation error results in severe performance deterioration in wireless networks. In this paper, we study the impact of imperfect channel estimation (ICE) on the outage performance of bidirectional relaying where ... -
All-to-all throughput maximization in wireless relay networks with multiple packet reception
(2012 , Conference Paper)Network Coding (NC) has shown the promise of significant throughput improvement to wireless networks. Meanwhile, Multiple Packet Reception (MPR) has been proved as an efficient way to combat the Multiple Access Interference ... -
Impact of location heterogeneity on random walk mobility models
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference Paper)This paper investigates random walk mobility models with location heterogeneity, where different locations may have different neighboring regions.With the assumption of totally n locations, we consider two cases, i.e., ... -
Incentive scheduler algorithm for cooperation and coverage extension in wireless networks
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)In this paper, we focus on wireless coverage extension and nodes' cooperation. We propose a new protocol based on an incentive approach and a scheduling algorithm to reward cooperative nodes. The cost of cooperation can ... -
Protecting private cloud located within public cloud
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference Paper)Many studies use cryptographic technologies to protect sensitive data in public cloud. However, these approaches may introduce large overheads. Recently, hybrid cloud started to gain a lot of attentions. A hybrid cloud ...