![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IET Communications, Volume 18
Volume 18, Number 1, January 2024
ORIGINAL RESEARCH
- Cong Xie, Mohammed El-Hajjar
, Soon Xin Ng
:
Machine learning assisted adaptive LDPC coded system design and analysis. 1-10 - Mohammed S. Elbasheir
, Rashid A. Saeed
, Salaheldin Edam:
Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site. 11-27 - Qiang Zhang
, Hao Yu:
Monte Carlo-based service migration under multiple constraints in mobile edge computing. 28-39 - Ruisi Wu
, Wen-Kang Jia
:
CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines. 40-54 - Zhijun Teng, Sian Zhu
, Mingzhe Li, Libo Yu, Jinliang Gu, Liwen Guo:
Wireless sensor network security defense strategy based on Bayesian reputation evaluation model. 55-62 - Xiangqun Lu, Hongzhi Zheng
, Yaqiong Liu, Hongxing Li, Qingyun Zhou, Tao Li, Hongguang Yang:
Segmentation-enhanced gamma spectrum denoising based on deep learning. 63-80 - Ling Tan
, Lei Sun
, Boyuan Cao
, Jingming Xia
, Hai Xu
:
Research on weighted energy consumption and delay optimization algorithm based on dual-queue model. 81-95 - Rui Wang
, Min Shen, Yun He, Xiangyan Liu
:
Joint AP-user association and caching strategy for delivery delay minimization in cell-free massive MIMO systems. 96-109
Volume 18, Number 2, January 2024
ORIGINAL RESEARCH
- Hongrui Nie
, Yue Su, Weibo Zhao, Junsheng Mu:
Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications. 111-128 - Yu Hua
, Yaru Fu, Qi Zhu:
On the design of cost minimization for D2D-enabled wireless caching networks: A joint recommendation, caching, and routing perspective. 129-144 - Chunzhi Wang, Keguan Wang
, Min Li, Feifei Wei, Neal Naixue Xiong
:
Chunk2vec: A novel resemblance detection scheme based on Sentence-BERT for post-deduplication delta compression in network transmission. 145-159 - Yaozong Fan, Yu Ma, Peng Pan
, Can Yang:
Bat algorithm based semi-distributed resource allocation in ultra-dense networks. 160-175 - Kan Feng, Changliang Yang, Wenqiang Zhu, Kun Li, Ya Chen
:
PageRank talent mining algorithm of power system based on cognitive load and DPCNN. 176-186
LETTER
- Esmot Ara Tuli, Rubina Akter, Jae Min Lee, Dong-Seong Kim:
Whale optimization-based PTS scheme for PAPR reduction in UFMC systems. 187-195
Volume 18, Number 3, February 2024
ORIGINAL RESEARCH
- Kusala Kalani Munasinghe
, Nishan Dharmaweera, Chamitha de Alwis, Uditha L. Wijewardhana, Rajendran Parthiban:
Impairment-aware resource allocation scheme for elastic optical networks with different service priorities. 197-213 - Yifan Du
, Nan Qi
, Kewei Wang, Ming Xiao, Wenjing Wang:
Intelligent reflecting surface-assisted UAV inspection system based on transfer learning. 214-224 - Peter O. Akuon
:
Error analysis for face coded modulation system. 225-234 - Yuebo Li
, Wenjiang Ouyang, Jiawu Miao
, Junsheng Mu, Xiaojun Jing:
Joint optimization of sampling point and sensing threshold for spectrum sensing. 235-247 - Mohammad Bayat
, Mohammad Mostafavi
, Abazar Arabameri:
Towards practical implementation of molecular communication: A cost-effective experimental platform based on the human circulatory system. 248-257 - Aboulfazl Dayyani, Maghsoud Abbaspour
:
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. 258-269
Volume 18, Number 4, March 2024
ORIGINAL RESEARCH
- Xianghui Xiao, Longsheng Huang
, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song:
Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm. 271-282 - Jing Zhang
, Chu-Long Liang, Hong-Xu Gao, He Yan, Hong-Bo Zhu:
On multiple handoff blocking-then-reaccess for opportunistic spectrum access. 283-296 - Ezekia Gilliard
, Jinshuo Liu, Ahmed Abubakar Aliyu:
Knowledge graph reasoning for cyber attack detection. 297-308 - Junyu Lin, Libo Feng, Jinli Wang
, Fei Qiu, Bei Yu, Jing Cheng, Shaowen Yao:
FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection. 309-321 - Fengming Yang
, Weiran Guo, Jianxin Dai:
Robust beamforming design for passive RIS-assisted NOMA systems. 322-331
Volume 18, Number 5, March 2024
ORIGINAL RESEARCH
- Wanwei Huang
, Haobin Tian, Xiaohui Zhang, Min Huang
, Song Li, Yuhua Li:
An improved resource allocation method for mapping service function chains based on A3C. 333-343 - Zixiao Yu
, Honghong Wang, Kim Un:
Automatic cinematography for body movement involved virtual communication. 344-352 - Ahlem Arfaoui
, Maha Cherif
, Ridha Bouallegue
:
Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning. 353-364 - Qingqing Tu
, Zheng Dong
, Xianbing Zou, Ning Wei, Ya Li, Fei Xu:
Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems. 365-374
Volume 18, Number 6, April 2024
ORIGINAL RESEARCH
- Xin Ma, Kai Yang
, Chuanzhen Zhang, Hualing Li, Xin Zheng:
Physical adversarial attack in artificial intelligence of things. 375-385 - Renjie Liao
, Shuo Wang
:
Malicious domain detection based on semi-supervised learning and parameter optimization. 386-397 - Jianli Xie
, Lin Li, Cuiran Li:
A joint resource optimization allocation algorithm for NOMA-D2D communication. 398-408 - Xiaoxuan Wang
, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian
:
Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication. 409-420 - Jiacheng Sui
, Yi Li, Hai Huang:
Improved reputation evaluation for reliable federated learning on blockchain. 421-428
Volume 18, Number 7, April 2024
ORIGINAL RESEARCH
- Yidong Jia
, Fuhong Lin, Yan Sun:
A novel federated learning aggregation algorithm for AIoT intrusion detection. 429-436 - Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang
:
An improved seeds scheme in K-means clustering algorithm for the UAVs control system application. 437-449 - Chao Ren
, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun
:
Two-step attribute reduction for AIoT networks. 450-460 - Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen
:
Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing. 461-476
Volume 18, Number 8, May 2024
ORIGINAL RESEARCH
- Feng Hu, Hongliu Zhang, ShuTing Chen
, Libiao Jin, Jinhao Zhang, Yunfei Feng:
Asymptotic performance of reconfigurable intelligent surface assisted MIMO communication for large systems using random matrix theory. 477-489 - Dongpo Song
, Peng Wei, Yongming Fu, Shilian Wang:
Construction of secure adaptive frequency hopping sequence sets based on AES algorithm. 490-502 - Youjun Zeng
, Jie Zhou, Youjiang Liu, Tao Cao, Dalong Yang, Yu Liu, Xianhua Shi:
Distributed MA-IDDPG-OLSR based stable routing protocol for unmanned aerial vehicle ad-hoc network. 503-522 - Jie Yan
, Bo Zhang
, Shi Wang
, Hao Lan, Xin Wang:
Burst traffic: Congestion management and performance optimization strategies in heterogeneous cognitive radio networks. 523-533
Volume 18, Number 9, June 2024
REVIEW
- Dengguo Feng, Yu Qin, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma:
Survey of research on confidential computing. 535-556
ORIGINAL RESEARCH
- Wei Gu, Hongyan Xing, Tianhao Hou:
An effective attention and residual network for malware detection. 557-568 - Abdulrahman Al Ayidh, Mohammed M. Alammar:
Energy efficient RF chains selection based on integrated Hungarian and genetic approaches for uplink cell-free millimetre-wave massive MIMO systems. 569-582 - Ghaffar Raeisi, Mohammad Gholami:
On a class of column-weight 3 decomposable LDPC codes with the analysis of elementary trapping sets. 583-596
Volume 18, Number 10, June 2024
ORIGINAL RESEARCH
- Yihang Du, Yu Zhang, Pengzhi Qian, Panfeng He, Wei Wang, Yifei Chen, Yong Chen:
A back-to-back coordination-based learning scheme for deceiving reactive jammers in distributed networks. 597-611 - Yangyi Zhang, Xinrong Guan, Qingqing Wu, Zhi Ji, Yueming Cai:
Resource allocation and passive beamforming for IRS-assisted short packet systems. 612-618 - Abdolrasoul Sakhaei Gharagezlou, Mahdi Nangir, Nima Imani:
Optimizing secure power allocation in massive MIMO systems with an eavesdropper under imperfect CSI conditions. 619-627 - Ozan Zorlu, Adnan Ozsoy:
A blockchain-based secure framework for data management. 628-653
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.