Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Overcoming constructive/destructive interference in diversity transmission via Alamouti coding

We propose a novel Alamouti-Orthogonal Frequency Division Multiplexing (OFDM) system that mitigates constructive and destructive interference in practical multi-antenna wireless communications. The...

A generalizable BERT-GNN hybrid framework for unified log anomaly detection

Logs are essential for monitoring large-scale distributed systems, yet their volume and structural heterogeneity pose substantial challenges for automated analysis. Conventional approaches often struggle...

Federated anomaly detection in smart grid systems

Smart Grid infrastructures have enhanced energy distribution efficiency, reliability, and sustainability, but their proper operation requires robust anomaly detection to mitigate risks from equipment...

GCN and DRL based on dependent task offloading mechanism in edge computing

Task offloading is critical for optimizing resource allocation in edge computing systems. In practical scenarios, user applications often comprise multiple interdependent tasks, where both task dependencies...

GCRA-FWVAE: Anomaly detection for IIoT univariate time series using time-frequency domain analysis

With the rapid development of Artificial Intelligence of Things (AIoT) technologies, the security of Industrial Internet of Things (IIoT) data faces increasing challenges, particularly in time series...

Experience replay with cohesive-subgraph awareness for continual graph learning in IoT

In the Internet-of-Things (IoT) scenarios, Continual Graph Learning (CGL) has become a key technique for capturing the complex relational structures underlying diverse applications including sensor...

DRL-enabled secure uplink transmission for MIMO-OFDM IoT systems against intelligent eavesdroppers

Physical layer security has emerged as a promising approach to counter eavesdropping threats in the Internet of Things (IoT). With the advancement of technology, eavesdroppers (Eves) are increasingly...

Personalized and sustainable federated learning in integrated Internet of Things

Integrated Internet of Things (IoT) brings novel opportunities for pervasive smart services, as these systems allow for seamless information and resource sharing among IoT devices. Meanwhile, Federated...

Communication-efficient federated multi-domain learning for network anomaly detection

Efficient and accurate anomaly detection in a network is of great significance for maintaining network and device security. Most anomaly detection methods assume that different anomalous network data...

Optimizing foreign fiber segmentation performance with DeepLab V3+ and GAN in industrial IoE environments

In industrial Internet of Everything (IoE) environments, the precise detection of tiny foreign fibers on the surface of bobbin yarns is crucial for ensuring the quality of textile products. However,...

RADAR: A rapid discovery algorithm for routes in SDN-based IoV

Link failures are a critical issue that disrupts consistent communications in the fast-evolving Internet-of-Vehicles (IoV) environment. In response to the aforementioned limitation, we introduce the...

EHKP-Res: an explainable dynamic security solution for medical healthcare

An increasing number of medical institutions and patients are adopting the practice of storing their data on medical cloud servers, which greatly facilitates the sharing of medical data. However, when...

A latency sensitive and agile IIoT architecture with optimized edge node selection and task scheduling

The Industrial Internet of Things (IIoT) has revolutionized conventional manufacturing industries by improving control, monitoring, and management, resulting in increased agility and long-term sustainability....

Path planning of autonomous underwater vehicle for data collection of the Internet of everything

Autonomous Underwater Vehicle (AUV) has become an important tool to accomplish various path planning tasks due to its high intelligence and good maneuverability. Aiming at the problem of data collection...

DDMI: a model information evaluation method based on deep dream

In recent years, the Internet of Everything (IoE) has been developing rapidly; however, there are currently issues with efficiency and sustainability within IoE. To address this problem, model lightweighting...

Video frame interpolation based on invertible neural network for Internet of things

Video frame interpolation focuses on directly synthesizing intermediate frames by utilizing inter-frame changes, relying heavily on large, high-frame-rate video datasets for supervised training, which...

Hybrid body area network with integrated sensing and communication for AIoT smart healthcare

For more accessible and advanced health monitoring, the Body Area Network (BAN) design with semantic technologies offers efficient information sensation and communication in smart healthcare Artificial...

Absolute calibration in massive MIMO systems: Analysis of errors and SNR requirements

In practical Massive Multiple-Input Multiple-Output (MIMO) systems, inherent Radio Frequency (RF) analog circuit mismatches across Base Station (BS) antennas inevitably degrade performance without precise...

Anonymous and revocable multi-message broadcast encryption scheme suitable for internet of vehicles

The Internet of Vehicles (IoV) enhances traffic efficiency and public safety by disseminating real-time road information to vehicles. However, practical deployments require effective mechanisms to revoke...

Semantic-aware visual information transmission with key information extraction over wireless networks

The advent of 6G networks demands unprecedented levels of intelligence, adaptability, and efficiency to address challenges such as ultra-high-speed data transmission, ultra-low latency, and massive...

Multi-feature weighted PBFT with reputation monopoly prevention

Practical Byzantine Fault Tolerance (PBFT) imposes a high communication overhead and is susceptible to reputation monopolies in scoring-based consensus. Driven by these limitations, this study proposes...

Optimal beamwidth of periodic reference signals for integrated sensing and communications in cellular-V2X networks

Recently, the technique of Integrated Sensing and Communication (ISAC) has gained great attentions and is expected to enable more advanced applications in cellular Vehicle-to-Everything (V2X). We intend...

Integration of GNSS and cellular infrastructure for large-scale indoor localization

Wireless indoor localization systems remain among the most promising technologies for enabling location-based services. Nevertheless, the inherent constraints of indoor environments often necessitate...

Blockchain-enhanced UAV networks for post-disaster communication: A decentralized flocking approach

Unmanned Aerial Vehicles (UAVs) have significant potential for agile communication and relief coordination in post-disaster scenarios, especially when conventional ground infrastructure is compromised....

Interference detection for UAV swarm satellite communications with spatiotemporal manifold filtering

Co-channel interference poses significant challenges to Unmanned Aerial Vehicle Swarm (UAVS) satellite communications within the Space-Air-Ground Integrated Network (SAGIN). To address this issue under...

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.