


default search action
IET Communications, Volume 18
Volume 18, Number 1, January 2024
ORIGINAL RESEARCH
- Cong Xie, Mohammed El-Hajjar
, Soon Xin Ng
:
Machine learning assisted adaptive LDPC coded system design and analysis. 1-10 - Mohammed S. Elbasheir
, Rashid A. Saeed
, Salaheldin Edam:
Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site. 11-27 - Qiang Zhang
, Hao Yu:
Monte Carlo-based service migration under multiple constraints in mobile edge computing. 28-39 - Ruisi Wu
, Wen-Kang Jia
:
CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines. 40-54 - Zhijun Teng, Sian Zhu
, Mingzhe Li, Libo Yu, Jinliang Gu, Liwen Guo:
Wireless sensor network security defense strategy based on Bayesian reputation evaluation model. 55-62 - Xiangqun Lu, Hongzhi Zheng
, Yaqiong Liu, Hongxing Li, Qingyun Zhou, Tao Li, Hongguang Yang:
Segmentation-enhanced gamma spectrum denoising based on deep learning. 63-80 - Ling Tan
, Lei Sun
, Boyuan Cao
, Jingming Xia
, Hai Xu
:
Research on weighted energy consumption and delay optimization algorithm based on dual-queue model. 81-95 - Rui Wang
, Min Shen, Yun He, Xiangyan Liu
:
Joint AP-user association and caching strategy for delivery delay minimization in cell-free massive MIMO systems. 96-109
Volume 18, Number 2, January 2024
ORIGINAL RESEARCH
- Hongrui Nie
, Yue Su, Weibo Zhao, Junsheng Mu:
Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications. 111-128 - Yu Hua
, Yaru Fu
, Qi Zhu:
On the design of cost minimization for D2D-enabled wireless caching networks: A joint recommendation, caching, and routing perspective. 129-144 - Chunzhi Wang, Keguan Wang
, Min Li, Feifei Wei, Neal Naixue Xiong
:
Chunk2vec: A novel resemblance detection scheme based on Sentence-BERT for post-deduplication delta compression in network transmission. 145-159 - Yaozong Fan, Yu Ma, Peng Pan
, Can Yang:
Bat algorithm based semi-distributed resource allocation in ultra-dense networks. 160-175 - Kan Feng, Changliang Yang, Wenqiang Zhu, Kun Li, Ya Chen
:
PageRank talent mining algorithm of power system based on cognitive load and DPCNN. 176-186
LETTER
- Esmot Ara Tuli
, Rubina Akter, Jae Min Lee, Dong-Seong Kim
:
Whale optimization-based PTS scheme for PAPR reduction in UFMC systems. 187-195
Volume 18, Number 3, February 2024
ORIGINAL RESEARCH
- Kusala Kalani Munasinghe
, Nishan Dharmaweera, Chamitha de Alwis, Uditha L. Wijewardhana, Rajendran Parthiban:
Impairment-aware resource allocation scheme for elastic optical networks with different service priorities. 197-213 - Yifan Du
, Nan Qi
, Kewei Wang, Ming Xiao, Wenjing Wang:
Intelligent reflecting surface-assisted UAV inspection system based on transfer learning. 214-224 - Peter O. Akuon
:
Error analysis for face coded modulation system. 225-234 - Yuebo Li
, Wenjiang Ouyang, Jiawu Miao
, Junsheng Mu, Xiaojun Jing:
Joint optimization of sampling point and sensing threshold for spectrum sensing. 235-247 - Mohammad Bayat
, Mohammad Mostafavi
, Abazar Arabameri:
Towards practical implementation of molecular communication: A cost-effective experimental platform based on the human circulatory system. 248-257 - Aboulfazl Dayyani, Maghsoud Abbaspour
:
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. 258-269
Volume 18, Number 4, March 2024
ORIGINAL RESEARCH
- Xianghui Xiao
, Longsheng Huang
, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song:
Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm. 271-282 - Jing Zhang
, Chu-Long Liang, Hong-Xu Gao, He Yan, Hong-Bo Zhu:
On multiple handoff blocking-then-reaccess for opportunistic spectrum access. 283-296 - Ezekia Gilliard
, Jinshuo Liu, Ahmed Abubakar Aliyu
:
Knowledge graph reasoning for cyber attack detection. 297-308 - Junyu Lin, Libo Feng, Jinli Wang
, Fei Qiu, Bei Yu, Jing Cheng, Shaowen Yao:
FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection. 309-321 - Fengming Yang
, Weiran Guo, Jianxin Dai:
Robust beamforming design for passive RIS-assisted NOMA systems. 322-331
Volume 18, Number 5, March 2024
ORIGINAL RESEARCH
- Wanwei Huang
, Haobin Tian, Xiaohui Zhang, Min Huang
, Song Li, Yuhua Li:
An improved resource allocation method for mapping service function chains based on A3C. 333-343 - Zixiao Yu
, Honghong Wang, Kim Un:
Automatic cinematography for body movement involved virtual communication. 344-352 - Ahlem Arfaoui
, Maha Cherif
, Ridha Bouallegue
:
Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning. 353-364 - Qingqing Tu
, Zheng Dong
, Xianbing Zou, Ning Wei, Ya Li, Fei Xu:
Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems. 365-374
Volume 18, Number 6, April 2024
ORIGINAL RESEARCH
- Xin Ma, Kai Yang
, Chuanzhen Zhang, Hualing Li, Xin Zheng:
Physical adversarial attack in artificial intelligence of things. 375-385 - Renjie Liao
, Shuo Wang
:
Malicious domain detection based on semi-supervised learning and parameter optimization. 386-397 - Jianli Xie
, Lin Li, Cuiran Li:
A joint resource optimization allocation algorithm for NOMA-D2D communication. 398-408 - Xiaoxuan Wang
, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian
:
Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication. 409-420 - Jiacheng Sui
, Yi Li, Hai Huang:
Improved reputation evaluation for reliable federated learning on blockchain. 421-428
Volume 18, Number 7, April 2024
ORIGINAL RESEARCH
- Yidong Jia
, Fuhong Lin, Yan Sun:
A novel federated learning aggregation algorithm for AIoT intrusion detection. 429-436 - Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang
:
An improved seeds scheme in K-means clustering algorithm for the UAVs control system application. 437-449 - Chao Ren
, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun
:
Two-step attribute reduction for AIoT networks. 450-460 - Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen
:
Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing. 461-476
Volume 18, Number 8, May 2024
ORIGINAL RESEARCH
- Feng Hu, Hongliu Zhang, ShuTing Chen
, Libiao Jin, Jinhao Zhang, Yunfei Feng:
Asymptotic performance of reconfigurable intelligent surface assisted MIMO communication for large systems using random matrix theory. 477-489 - Dongpo Song
, Peng Wei, Yongming Fu, Shilian Wang:
Construction of secure adaptive frequency hopping sequence sets based on AES algorithm. 490-502 - Youjun Zeng
, Jie Zhou, Youjiang Liu, Tao Cao, Dalong Yang, Yu Liu, Xianhua Shi:
Distributed MA-IDDPG-OLSR based stable routing protocol for unmanned aerial vehicle ad-hoc network. 503-522 - Jie Yan
, Bo Zhang
, Shi Wang
, Hao Lan, Xin Wang:
Burst traffic: Congestion management and performance optimization strategies in heterogeneous cognitive radio networks. 523-533
Volume 18, Number 9, June 2024
REVIEW
- Dengguo Feng
, Yu Qin, Wei Feng
, Wei Li, Ketong Shang, Hongzhan Ma:
Survey of research on confidential computing. 535-556
ORIGINAL RESEARCH
- Wei Gu, Hongyan Xing
, Tianhao Hou
:
An effective attention and residual network for malware detection. 557-568 - Abdulrahman Al Ayidh
, Mohammed M. Alammar:
Energy efficient RF chains selection based on integrated Hungarian and genetic approaches for uplink cell-free millimetre-wave massive MIMO systems. 569-582 - Ghaffar Raeisi
, Mohammad Gholami
:
On a class of column-weight 3 decomposable LDPC codes with the analysis of elementary trapping sets. 583-596
Volume 18, Number 10, June 2024
ORIGINAL RESEARCH
- Yihang Du
, Yu Zhang
, Pengzhi Qian, Panfeng He, Wei Wang
, Yifei Chen, Yong Chen:
A back-to-back coordination-based learning scheme for deceiving reactive jammers in distributed networks. 597-611 - Yangyi Zhang
, Xinrong Guan, Qingqing Wu, Zhi Ji, Yueming Cai:
Resource allocation and passive beamforming for IRS-assisted short packet systems. 612-618 - Abdolrasoul Sakhaei Gharagezlou, Mahdi Nangir
, Nima Imani:
Optimizing secure power allocation in massive MIMO systems with an eavesdropper under imperfect CSI conditions. 619-627 - Ozan Zorlu
, Adnan Ozsoy:
A blockchain-based secure framework for data management. 628-653
Volume 18, Number 11, July 2024
Original Research
- Zeyu Yan
, Weile Zhang, Fuqiang Li:
Doppler spread analysis for suppressing channel time variation in high-mobility massive MIMO V2V communications. 655-670 - Yunping Mu
, Chaochao Yao, Dian Fan, Yongjun Xu, Gongpu Wang, Marjan Milosevic, Bo Ai:
Channel estimation for backscatter communication systems with retrodirective arrays. 671-678 - Arif Hossan
, Jahidul Islam:
Secondary cluster head based SEP in heterogeneous WSNs for IoT applications. 679-688 - Chenyu Zhang
, Huabing Wu:
A composite spread spectrum sequence for underwater acoustic signal acquisition. 689-700
Volume 18, Number 12, July 2024
Original Research
- Fang Liu
, Yuanfang Zheng
, Lizhi Chen, Yongxin Feng:
A chaotic time series combined prediction model for improving trend lagging. 701-712 - Minghui Jia
, Xiaohu Huang, Fengjun Han, Dequan Yan, Wei Wang, Guochao Zhu, Lin Zhang, Chao Pan, Haifeng Ma, Jidong Wei:
Multi-view synergistic enhanced fault recording data for transmission line fault classification. 713-725 - Hongsheng Chen
, Chunhui Wu:
Clustered DTN routing based on sensing node relationship strength. 726-743 - Changqing Ye
, Hong Jiang, Chen-Ping Zeng, Haoxin Shi, Zhan-Peng Tang:
Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters. 744-758
Volume 18, Number 13, August 2024
Original Research
- Mohammed Salah Abood, Hua Wang, Bal S. Virdee
, Dongxuan He
, Maha Fathy, Abdulganiyu Abdu Yusuf, Omar Jamal, Taha A. Elwi, Mohammad Alibakhshikenari
, Lida Kouhalvandi
, Ashfaq Ahmad
:
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning. 759-777 - Mina Asgarian, Ghasem Mirjalily
:
A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services. 778-788 - Pooria Tabesh Mehr
, Konstantinos Koufos, Karim E. I. Haloui, Mehrdad Dianati
:
Low-complexity channel estimation for V2X systems using feed-forward neural networks. 789-798 - Weihao Sun
, Hai Wang, Zhen Qin
, Zichao Qin:
Joint optimization of deployment, user association, channel, and resource allocation for fairness-aware multi-UAV network. 799-816
Volume 18, Number 14, August 2024
Original Research
- Bo He
, Hongji Xu, Wei Ji, Yan Du, Hailiang Xiong
, Jun Li:
Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems. 817-826 - Fanghao Xu
, Chao Wang, Jiakai Liang, Chenyang Zuo, Keqiang Yue
, Wenjun Li:
A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models. 827-845 - Nasser Zarbi, Ali Zaeembashi, Nasour Bagheri
, Morteza Adeli:
Toward designing a lightweight RFID authentication protocol for constrained environments. 846-859 - Bingyi Xie
, Honghui Xu
, Daehee Seo, DongMyung Shin, Zhipeng Cai:
KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing. 860-868
Volume 18, Number 15, September 2024
Original Research
- Ogunlade M. Adegoke, Saheed Lekan Gbadamosi
, Babatunde S. Adejumobi, Israel E. Owolabi, Wasiu Adeyemi Oke, Nnamdi I. Nwulu
:
Noise modelling and mitigation for broadband in-door power line communication systems. 869-881 - Cheng Wang
, Hai Xue
, Zhan Huan:
BPNN-based flow classification and admission control for software defined IIoT. 882-896 - Wenqiang Shi
, Yingke Lei
, Hu Jin
, Fei Teng
, Caiyi Lou
:
Specific emitter identification by wavelet residual network based on attention mechanism. 897-907 - Lin Zhu
, Long Tan, Bingxian Li, Huizi Tian:
An optimization scheme for vehicular edge computing based on Lyapunov function and deep reinforcement learning. 908-924
Volume 18, Number 16, October 2024
Original Research
- Shoushuai He
, Lei Zhu, Lei Wang, Weijun Zeng, Zhen Qin
:
Fine-grained spectrum map inference: A novel approach based on deep residual network. 925-937 - Mahboobeh Eshaghi, Ali Nodehi, Hosein Mohamadi
:
A new hybrid genetic algorithm with tabu search for solving the temporal coverage problem using rotating directional sensors. 938-949 - Maha Al-Sharif, Anas Bushnag
:
Enhancing cloud security: A study on ensemble learning-based intrusion detection systems. 950-965 - Tianyu Zheng
, Chao Xu, Zhengping Li, Chao Nie, Rubin Xu, Minpeng Jiang
, LeiLei Li:
BFT-Net: A transformer-based boundary feedback network for kidney tumour segmentation. 966-977
Volume 18, Number 17, October 2024
Original Research
- Jianguo Yao
, Ziwei Liu, Xiaoming Wang:
Study of construction of Golomb Costas arrays with ideal autocorrelation properties based on extension field. 979-992 - Roza Banitalebi Dehkordi
, Mohsen Mivehchy
, Mohammad Farzan Sabahi:
A novel quasi-FM demodulator as AM demodulator for amplitude limited signals. 993-1001 - Yanbing Yang
, Jing Lei, Ke Lai:
Dual-mode codeword position index based SCMA with transmit diversity. 1002-1017 - Nisha P. Shetty
, Balachandra Muniyal, Leander Melroy Maben, Rithika Jayaraj, Sameer Saxena:
Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever-evolving relationships. 1018-1048 - Yukai Liu
, Rongke Liu, Qizhi Chen, Ling Zhao:
A high-precision timing and frequency synchronization algorithm for multi-h CPM signals. 1049-1061 - Chidi E. Ngene, Prabhat Thakur
, Ghanshyam Singh
:
Analysis of interference effect in VL-NOMA network considering signal power parameters performance. 1062-1070 - Oluwaseyi Paul Babalola
, Vipin Balyan
:
Dimmable constant weight polar-coded non-orthogonal multiple access with orthogonal space-time block coding visible light communication systems. 1071-1078 - Jeta Dobruna, Zana Limani Fazliu
, Hëna Maloku
, Mojca Volk:
A heuristic approach to energy efficient user association in ultra-dense HetNets using intermittent scheduling strategies. 1079-1088 - Yuchen Shi
, Shangdong Liu, Sisi Shao, Yimu Ji, Fei Wu, Tiansheng Gu, Yulu Zheng, Yijun Nie, Zongkai Ji, Cailing Sun, Zeng Chen, Yawei Sun:
Mimic turbo compiled code structure for wireless communication systems. 1089-1106 - Dinh-Minh Vu
, Thi Ha La, Nguyen Gia Bach, Eui-Nam Huh, Hoang-Hai Tran:
Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism. 1107-1125 - Enhao Wang
, Yunfei Chen
, Aïssa Ikhlef, Hongjian Sun
:
Dual-user joint sensing and communications with time-divisioned bi-static radar. 1126-1139 - Shuang Li, Jiacheng Wang
, Baoguo Yu, Hantong Xing
, Shuang Wang:
A deep learning-based approach for pseudo-satellite positioning. 1140-1150
Volume 18, Number 18, November 2024
Original Research
- Zeinab Nazemi Absardi, Reza Javidan
:
A predictive SD-WAN traffic management method for IoT networks in multi-datacenters using deep RNN. 1151-1165 - Wu Zheng, Chen Liu
, Yunchao Song
, Tianbao Gao
:
Two stage beamforming and combining scheme for FDD massive MIMO systems with multi-antenna users. 1166-1178 - Haitao Zhao, Zhuoran Xu
, Yiyang Ni, Wenxue Sun, Hongbo Zhu, Yaxuan Liu
, Zhaoying Mo:
Optimization strategy of UAV-ARIS assisted vehicular communication system. 1179-1190 - Siling Wang
, Li Zhang
:
Support vector machine-based handover scheme for heterogeneous ultra dense network of high-speed railway. 1191-1204 - Changliang Zheng
, Kang Yang, Tielian Fu, Tianle Liu, Mengqi Yang:
Performance of massive MIMO-NOMA systems with low complexity group SIC receivers and low-resolution ADCs. 1205-1219 - Jia Han
, Zhiyong Yu
, Jian Yang
:
A lightweight deep learning architecture for automatic modulation classification of wireless internet of things. 1220-1230 - Shuyi Wang
, Haotong Cao, Longxiang Yang:
A hierarchical reinforcement learning approach for energy-aware service function chain dynamic deployment in IoT. 1231-1243 - Rui Wei
, Tuanfa Qin
, Jinbao Huang
, Ying Yang, Junyu Ren
, Lei Yang:
Resource allocation scheduling scheme for task migration and offloading in 6G Cybertwin internet of vehicles based on DRL. 1244-1265 - Zhifeng Huang
, Feng Ke, Hui Song:
A D2D user pairing algorithm based on motion prediction and power control. 1266-1281 - Peter O. Akuon
:
Polarized APSK modulation system with polymorphic SC signals. 1282-1291 - Lei Lan, Zhongpeng Wang, Lijuan Zhang
:
A path splitting and pruning strategy on list decoder for PAC codes. 1292-1299 - Jeyavim Sherin R. C., Parkavi Krishnamoorthy
:
An innovative model for an enhanced dual intrusion detection system using LZ-JC-DBSCAN, EPRC-RPOA and EG-GELU-GRU. 1300-1318
Volume 18, Number 19, 2024
- Sigrid Dimce, Falko Dressler:
Survey on coherent multiband splicing techniques for wideband channel characterization. 1319-1334 - Wen-long Sun, Jie Guan:
Algebraic side-channel attacks on Trivium stream cipher. 1335-1347 - Yaswanth K. N. G. B, Valluri Sivaprasad, Noel Anurag Prashanth, Sachin Salunkhe, Miroslav Mahdal, Chakravarthy Gunturu:
Implementation of preamble based GFDM prototype for robust 5G systems. 1348-1357 - Qihong Duan, Heng Du, Jiang Xue, Feng Li:
Empirical modelling and analysis of phase noise in OFDM systems. 1358-1370 - Arash Salehpour, Monire Norouzi, Mohammad Ali Balafar, Karim Samadzamini:
A cloud-based hybrid intrusion detection framework using XGBoost and ADASYN-Augmented random forest for IoMT. 1371-1390 - Mehran Kakavand, Mohammadreza Hassannejad Bibalan, Mina Baghani:
Capacity analysis over fractional order Rayleigh fading channel under additive white generalized Gaussian noise. 1391-1402 - Yifeng Zhao, Haoran Liu, Xuanhui Liu, Xiaoqi Wang, Zhibin Gao, Lianfen Huang:
IBTD: A novel ISAC beam tracking based on deep reinforcement learning for mmWave V2V networks. 1403-1416 - Eman Abouelkheir:
Efficient provable dual receiver hybrid and light weight public key schemes based on the discrete logarithm problem without pairings. 1417-1427 - Yuqiao Xu, Wei Du, Lewu Deng, Yi Zhang, Wanli Wen:
Ship target detection in SAR images based on SimAM attention YOLOv8. 1428-1436 - Xianghui Han, Shuai Zhou, Shuaihua Kou, Jian Li, Ruiqi Liu, Shi Jin:
Dynamic and efficient device collaborations in 5G-advanced and 6G networks. 1437-1450 - Ghassan Husnain, Zia Ullah, Muhammad Ismail Mohmand, Mansoor Qadir, Khalid J. Alzahrani, Yazeed Yasin Ghadi, Hend Khalid Alkahtani:
HealthChain: A blockchain-based framework for secure and interoperable electronic health records (EHRs). 1451-1473 - Inaamullah Khan, Michael Cheffena:
Optimal pilot pattern for data-aided channel estimation for MIMO-OFDM wireless systems. 1474-1484 - Yuchen Hu, Yihang Du, Xiaoqiang Qiao, Chen Zhao, Tao Zhang, Jiang Zhang:
Few-shot cross-receiver radio frequency fingerprinting identification based on feature separation. 1485-1498 - Heyi Li, Hong Wang, Peiqi Li, Peiyu Wang:
Transmission scheme for collaborative-RIS-aided NOMA system with multiple channels. 1499-1509 - Lihua Yang, Suwan Wei, Jiawen Ma, Han Xue, Jun Sun:
Modeling and analysis of propagation characteristics of WBAN in hospital ward scenarios. 1510-1523 - Zia Ullah, Ghassan Husnain, Muhammad Ismail Mohmand, Mansoor Qadir, Khalid J. Alzahrani, Yazeed Yasin Ghadi, Hend Khalid Alkahtani:
Blockchain-IoT: A revolutionary model for secure data storage and fine-grained access control in internet of things. 1524-1540 - Qi Chen, Jingjing Yang, Ming Huang, Qiang Zhou:
ACT-GAN: Radio map construction based on generative adversarial networks with ACT blocks. 1541-1550 - Guan Qing Yang:
Massive MIMO uplink and downlink joint representation based on couple dictionary learning. 1551-1563 - Lihua Yang, Yongqi Shao, Ao Chang, Bo Hu:
A scheme of combining DFO and channel estimation scheme for mobile OFDM systems. 1564-1573 - Xiaoying Liu, Xinyu Kuang, Zefu Li, Kechen Zheng:
Joint channel allocation and transmit power control for underlay EH-CRNs: A clustering-based multi-agent DDPG approach. 1574-1587 - Clément Demeslay, Roland Gautier, Philippe Rostaing, Angela Digulescu, Cristina Despina-Stoian, Gilles Burel:
A PAPR correction scheme for LoRa self-jamming waveforms. 1588-1603 - Shilong Zhang, Yu Song, Shubin Wang:
MAE-SigNet: An effective network for automatic modulation recognition. 1604-1620 - Youhan Yuan, Qi Zhu:
Optimization algorithm of UAV-assisted federated learning resources based on wireless energy harvesting. 1621-1631 - Jan Mietzner:
Analysis of error rates and capacity outage of wireless links under jamming and multipath signal fading. 1632-1641 - Yu-xuan Sun, Zhu Meng, Hua Yang, Guoping Jiang:
A novel carrier index M-ary differential chaos shift keying modulation scheme. 1642-1649 - Xiaoying Liu, Huihui Liu, Biao Zhou, Kechen Zheng:
Trajectory design and transmission optimization for data freshness in UAVs-assisted WPCNs. 1650-1663
Volume 18, Number 20, 2024
- Yajun Zhao:
RIS assisted wireless networks: Collaborative regulation, deployment mode and field testing. 1665-1682 - Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma:
A literature review on V2X communications security: Foundation, solutions, status, and future. 1683-1715 - Gang Xie, Zhixiang Pei, Gaole Long, Yuanan Liu:
Hybrid precoding algorithm for Wi-Fi interference suppression based on deep learning. 1716-1727 - Qingyang Guan:
Analysis for sparse channel representation based on dictionary learning in massive MIMO systems. 1728-1740 - Kexin Liu, Mingliang Li, Kaizhi Huang, Zheng Wan, Qinlong Li, Xiaoli Sun, Xiaoming Xu, Liang Jin:
Secret key generation for reconfigurable intelligent surface-assisted MISO multi-user system. 1741-1752 - Anwar Ahmed Khan, Shama Siddiqui, Muhammad Shoaib Siddiqui:
Delay management for heterogeneous traffic in vehicular sensor networks using packet fragmentation of low priority data. 1753-1764 - S. Pratap Singh, Urvashi Chugh, Deepak Kumar Singh, Amit Kumar, Kanwar Preet Kaur, Nitin Rakesh, Ghanshyam Singh:
Performance analysis of electromagnetic nano-communication with interference over dual selection combining diversity technique. 1765-1777 - Syed Sabir Mohamed S, Saranraj Gunasekaran, Rani Chinnamuthu, Gavendra Singh:
Dynamic hierarchical intrusion detection system for internet of vehicle on edge computing platform. 1778-1794 - Chen Chen, Fengfan Yang:
Distributed GRS-coded differential spatial modulation for half-duplex cooperative network based on relay optimization and joint decoding. 1795-1812 - Yin Zhang, Zhen Zhen, Yuli Zhao, Francis C. M. Lau, Bochang Ma, Bin Zhang, Hai Yu, Zhiliang Zhu:
Online fountain code with an improved caching mechanism. 1813-1825 - Bin Yu, Guo-ping Jiang, Hua Yang, Ya-qiong Jia:
M-ary differential chaos shift keying with carrier index modulation for high-data-rate transmission. 1826-1839 - Sujit Biswas, Kashif Sharif, Zohaib Latif, Mohammed J. F. Alenazi, Ashok Kumar Pradhan, Anupam Kumar Bairagi:
Blockchain controlled trustworthy federated learning platform for smart homes. 1840-1852 - Nima Tavangaran, Mingzhe Chen, Zhaohui Yang, Jose Mairton B. da Silva Jr., H. Vincent Poor:
On differential privacy for federated learning in wireless systems with multiple base stations. 1853-1867 - Di Yao, Kai Zhang, Hua-ju Song, Sha Wei, Yuwen Qian, Jun Li:
On optimization of resource allocation for LTE aided by WLAN networks with unlicensed frequency bands in internet of vehicles. 1868-1877 - Zixiang Han, Haiyu Ding, Lincong Han, Liang Ma, Xiaozhou Zhang, Mengting Lou, Yajuan Wang, Jing Jin, Qixing Wang, Guangyi Liu, Jiangzhou Wang:
Cellular network based multistatic integrated sensing and communication systems. 1878-1888 - Renbin Fang, Peng Lin, Yize Liu, Yan Liu:
Task offloading and resource allocation for blockchain-enabled mobile edge computing. 1889-1899 - Wuchang Zhong, Siming Wang, Rong Yu:
iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles. 1900-1914 - Ci He, Yasheng Zhang, Yuejun Yu, Cong Li:
Research on hierarchical and sub-area network control technology of LEO giant constellation. 1915-1926 - Kechen Zheng, Jiahong Wang, Anping Chen, Wendi Sun, Xiaoying Liu, Jia Liu:
Spectrum utilization improvement for multi-channel EH-CRN with spectrum sensing. 1927-1942 - Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Ya Liu, Zheng Chu:
Secure energy efficiency maximization for joint ITS and IRS assisted satellite downlink communications. 1943-1955 - Dan Jiang, Yuanyuan Gao, Guoxin Li, Nan Sha, Jihao Cai, Chengfei Ding:
Secure transmission design in cooperative NOMA networks: Orienting toward user requirements. 1956-1966 - Mohammad Reza Kavianinia, Mohammad Javad Emadi, Mohammad Ali Sedaghat:
On weighted sum-rate maximization of full-duplex systems in presence of STAR-RIS. 1967-1982 - Shuo Wang, Qingqi Pei, Yang Xiao, Feng Shao, Shuai Yuan, Jiang Chu, Renjie Liao:
Probabilistic models for evaluating network edge's resistance against scan and foothold attack. 1983-1995 - Correction to "5G based blockchain network for authentic and ethical keyword search engine". 1996

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.