Environment-aware streaming media transmission method in high-speed mobile networks
Available online 17 March 2025
With technological advancements, high-speed rail has emerged as a prevalent mode of transportation. During travel, passengers exhibit a growing demand for streaming media services. However, the high-speed...
Share article
DDMI: A Model Information Evaluation Method Based on Deep Dream
Available online 17 March 2025
In recent years, the Internet of Everything (IoE) has been developing rapidly; however, there are currently issues with efficiency and sustainability within IoE. To address this problem, model lightweighting...
Share article
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
Available online 13 March 2025
Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address...
Share article
CARS: connection as required scheme for horizontal communications in Industry 4.0
Available online 13 March 2025
In the rapidly evolving landscape of Industry 4.0 (I4.0), the convergence of information and operational technologies necessitates real-time communication and collaboration across cyber-physical systems...
Share article
UAV-assisted full-duplex ISAC: Joint communication scheduling, beamforming, and trajectory optimization
Available online 12 March 2025
This paper proposes the Unmanned Aerial Vehicle (UAV)-assisted Full-Duplex (FD) Integrated Sensing And Communication (ISAC) system. In this system, the UAV integrates sensing and communication functions,...
Share article
Large language model-driven probabilistic trajectory prediction in the Internet of Things using spatio-temporal encoding and normalizing flows
Available online 10 March 2025
The convergence of the Internet of Things (IoT) and foundation models, particularly Large Language Models (LLMs), heralds a new era of intelligent and adaptive systems. This investigation explores the...
Share article
Distributed context-aware Transformer enables dynamic energy consumption prediction for smart building networks
Available online 10 March 2025
The integration of communication networks and artificial intelligence enables the effective collection of data over smart building networks, facilitating more accurate predictions of Building Energy...
Share article
Optimizing foreign fiber segmentation performance with DeepLab V3+ and GAN in industrial IoE environments
Available online 10 March 2025
In industrial Internet of Everything (IoE) environments, the precise detection of tiny foreign fibers on the surface of bobbin yarns is crucial for ensuring the quality of textile products. However,...
Share article
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links
February 2025
In this paper, a double-effect DNN-based Digital Back-Propagation (DBP) scheme is proposed and studied to achieve the Integrated Communication and Sensing (ICS) ability, which can not only realize nonlinear...
Share article
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks
February 2025
In this paper, the application of Non-Orthogonal Multiple Access (NOMA) is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential eavesdropper....
Share article
A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding
February 2025
Distributed Federated Learning (DFL) technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets, making it a desirable solution for decentralized...
Share article
A multi-dimensional trust attestation solution in 5G-IoT
February 2025
The core missions of IoT are to sense data, transmit data and give feedback to the real world based on the calculation of the sensed data. The trust of sensing source data and transmission network is...
Share article
Security analysis and secured access design for networks of image remote sensing
February 2025
The secured access is studied in this paper for the network of the image remote sensing. Each sensor in this network encounters the information security when uploading information of the images wirelessly...
Share article
A pipelining task offloading strategy via delay-aware multi-agent reinforcement learning in Cybertwin-enabled 6G network
February 2025
Cybertwin-enabled 6th Generation (6G) network is envisioned to support artificial intelligence-native management to meet changing demands of 6G applications. Multi-Agent Deep Reinforcement Learning...
Share article
8K Ultra HD TV broadcast system: Challenge, architecture and implementation
February 2025
The size of the Audio and Video (AV) content of the 8K program is four times larger than that of 4K content, providing viewers with a more ideal audiovisual experience while placing higher demands on...
Share article
METAseen: analyzing network traffic and privacy policies in Web 3.0 based Metaverse
February 2025
Metaverse is a new emerging concept building up a virtual environment for the user using Virtual Reality (VR) and blockchain technology but introduces privacy risks. Now, a series of challenges arise...
Share article
Multi-agent deep reinforcement learning based resource management in heterogeneous V2X networks
February 2025
In Heterogeneous Vehicle-to-Everything Networks (HVNs), multiple users such as vehicles and handheld devices and infrastructure can communicate with each other to obtain more advanced services. However,...
Share article
ACSarF: a DRL-based adaptive consortium blockchain sharding framework for supply chain finance
February 2025
Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications. However, conventional blockchain technologies suffer from long transaction delays and low transaction success rates...
Share article
Container cluster placement in edge computing based on reinforcement learning incorporating graph convolutional networks scheme
February 2025
Container-based virtualization technology has been more widely used in edge computing environments recently due to its advantages of lighter resource occupation, faster startup capability, and better...
Share article
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT
February 2025
As the information sensing and processing capabilities of IoT devices increase, a large amount of data is being generated at the edge of Industrial IoT (IIoT), which has become a strong foundation for...
Share article
Towards intelligent and trustworthy task assignments for 5G-enabled industrial communication systems
February 2025
With the unprecedented prevalence of Industrial Internet of Things (IIoT) and 5G technology, various applications supported by industrial communication systems have generated exponentially increased...
Share article
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
February 2025
As smart contracts, represented by Solidity, become deeply integrated into the manufacturing industry, blockchain-based Digital Twins (DT) has gained momentum in recent years. Most of the blockchain...
Share article
Preamble slice orderly queue access scheme in cell-free dense communication systems
February 2025
High reliability applications in dense access scenarios have become one of the main goals of 6G environments. To solve the access collision of dense Machine Type Communication (MTC) devices in cell-free...
Share article
In-band full-duplex MIMO PLC systems for relaying networks
February 2025
In Power Line Communications (PLC), there are regulatory masks that restrict the transmit power spectral density for electromagnetic compatibility reasons, which creates coverage issues despite the...
Share article
Joint offloading decision and resource allocation in vehicular edge computing networks
February 2025
With the rapid development of Intelligent Transportation Systems (ITS), many new applications for Intelligent Connected Vehicles (ICVs) have sprung up. In order to tackle the conflict between delay-sensitive...
Share article