Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Cross-chain mapping blockchain: scalable data management in massive IoT networks

We propose a Cross-Chain Mapping Blockchain (CCMB) for scalable data management in massive Internet of Things (IoT) networks. Specifically, CCMB aims to improve the scalability of securely storing,...

Share article

Low-complexity multi-target localization via multi-BS sensing

Integrated Sensing and Communication (ISAC) is envisioned as a promising technology for Sixth-Generation (6G) wireless communications, which enables simultaneous high-rate communication and high-precision...

Share article

A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks

Recognized as a pivotal facet in Beyond Fifth-Generation (B5G) and the upcoming Sixth-Generation (6G) wireless networks, Unmanned Aerial Vehicle (UAV) communications pose challenges due to limited capabilities...

Share article

Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios

Due to the neglect of the retrieval of communication parameters (including the symbol rate, the symbol timing offset, and the carrier frequency), the existing non-cooperative communication mode recognizers...

Share article

Joint jammer selection and power optimization in covert communications against a warden with uncertain locations

In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect channel...

Share article

Profit-driven distributed trading mechanism for IoT data

Data trading is a crucial means of unlocking the value of Internet of Things (IoT) data. However, IoT data differs from traditional material goods due to its intangible and replicable nature. This difference...

Share article

Dynamically redactable blockchain based on decentralized Chameleon hash

The immutability is a crucial property for blockchain applications, however, it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data. Although...

Share article

Deep learning aided underwater acoustic OFDM receivers: Model-driven or data-driven?

The Underwater Acoustic (UWA) channel is bandwidth-constrained and experiences doubly selective fading. It is challenging to acquire perfect channel knowledge for Orthogonal Frequency Division Multiplexing...

Share article

BCAS: Blockchain-based secure access and sharing scheme for EHR data

Sharing Electronic Health Record (EHR) data is critical for improving medical decision-making and emergency care. However, EHRs contain sensitive patient information, making data breaches and misuse...

Share article

Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach

A Mixed Numerology OFDM (MN-OFDM) system is essential in 6G and beyond. However, it encounters challenges due to Inter-Numerology Interference (INI). The upcoming 6G technology aims to support innovative...

Share article

Index modulation aided generalized space-time block coding: A unified MIMO framework

In this paper, Index Modulation (IM) aided Generalized Space-Time Block Coding (GSTBC) is proposed, which intrinsically exploits the benefits of IM concept, diversity gain and spatial multiplexing gain....

Share article

A fine-grained intrusion protection system for inter-edge trust transfer

The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin era. However, the natural barrier between edge equipment owned...

Share article

ECO++: Adaptive deep feature fusion target tracking method in complex scene

Efficient Convolution Operator (ECO) algorithms have achieved impressive performances in visual tracking. However, its feature extraction network of ECO is unconducive for capturing the correlation...

Share article

A secure double spectrum auction scheme

With the arrival of the 5G era, wireless communication technologies and services are rapidly exhausting the limited spectrum resources. Spectrum auctions came into being, which can effectively utilize...

Share article

Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing

Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great...

Share article

Outage analysis of aerial semi-grant-free NOMA systems

In this paper, we analyze the outage performance of Unmanned Aerial Vehicles (UAVs)-enabled downlink Non-Orthogonal Multiple Access (NOMA) communication systems with the Semi-Grant-Free (SGF) transmission...

Share article

A learning automata based edge resource allocation approach for IoT-enabled smart cities

The development of the Internet of Things (IoT) technology is leading to a new era of smart applications such as smart transportation, buildings, and smart homes. Moreover, these applications act as...

Share article

IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges

Non-Orthogonal Multiple Access (NOMA) has already proven to be an effective multiple access scheme for 5th Generation (5G) wireless networks. It provides improved performance in terms of system throughput,...

Share article

Intelligent cache and buffer optimization for mobile VR adaptive transmission in 5G edge computing networks

Virtual Reality (VR) is a key industry for the development of the digital economy in the future. Mobile VR has advantages in terms of mobility, lightweight and cost-effectiveness, which has gradually...

Share article

A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array

Millimeter-wave (mmWave) Non-Orthogonal Multiple Access (NOMA) with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations...

Share article

An autoencoder-based feature level fusion for speech emotion recognition

Although speech emotion recognition is challenging, it has broad application prospects in human-computer interaction. Building a system that can accurately and stably recognize emotions from human languages...

Share article

The Generalized-Fisher composite fading model for the next generation of mobile communication systems

The new generation of communication systems is moving towards using a millimeter-wave spectrum. Since the shadowing effects are undeniable in this type of propagation, the proposed Generalized Fisher...

Share article

AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks

In Software-Defined Networks (SDNs), determining how to efficiently achieve Quality of Service (QoS)-aware routing is challenging but critical for significantly improving the performance of a network,...

Share article

A low-complexity AMP detection algorithm with deep neural network for massive mimo systems

Signal detection plays an essential role in massive Multiple-Input Multiple-Output (MIMO) systems. However, existing detection methods have not yet made a good tradeoff between Bit Error Rate (BER)...

Share article

Secure data rate maximization for full-duplex UAV-enabled base station

Unmanned Aerial Vehicle (UAV) is an air base station featuring flexible deployment and mobility. It can significantly improve the communication quality of the system due to its line-of-sight channel...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.