default search action
Alia Asheralieva
Person information
- affiliation: Singapore University of Technolofy and Design, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Alia Asheralieva, Dusit Niyato, Xuetao Wei:
Ultrareliable Low-Latency Slicing in Space-Air-Ground Multiaccess Edge Computing Networks for Next-Generation Internet of Things and Mobile Applications. IEEE Internet Things J. 11(3): 3956-3978 (2024) - [j36]Alia Asheralieva, Dusit Niyato, Yoshikazu Miyanaga:
Efficient Dynamic Distributed Resource Slicing in 6G Multi-Access Edge Computing Networks With Online ADMM and Message Passing Graph Neural Networks. IEEE Trans. Mob. Comput. 23(4): 2614-2638 (2024) - [j35]Alia Asheralieva, Dusit Niyato:
Multi-Access Edge Computing for Real-Time Applications With Sporadic DAG Tasks - A Graphical Game Approach. IEEE Trans. Mob. Comput. 23(10): 9167-9190 (2024) - [j34]Yulong Chen, Alia Asheralieva, Xuetao Wei:
AtomCI: A New System for the Atomic Cross-Chain Smart Contract Invocation Spanning Heterogeneous Blockchains. IEEE Trans. Netw. Sci. Eng. 11(3): 2782-2796 (2024) - [j33]Weiquan Ni, Alia Asheralieva, Jiawen Kang, Zehui Xiong, Carsten Maple, Xuetao Wei:
An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains. IEEE Trans. Serv. Comput. 17(2): 420-436 (2024) - [c16]Ke Mu, Bo Yin, Alia Asheralieva, Xuetao Wei:
Separation is Good: A Faster Order-Fairness Byzantine Consensus. NDSS 2024 - [i2]Hulin Yang, Mingzhe Li, Jin Zhang, Alia Asheralieva, Qingsong Wei, Rich Siow Mong Goh:
BriDe Arbitrager: Enhancing Arbitrage in Ethereum 2.0 via Bribery-enabled Delayed Block Production. CoRR abs/2407.08537 (2024) - 2023
- [j32]Alia Asheralieva, Dusit Niyato, Zehui Xiong:
Auction-and-Learning Based Lagrange Coded Computing Model for Privacy-Preserving, Secure, and Resilient Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(2): 744-764 (2023) - [j31]Alia Asheralieva, Dusit Niyato:
Secure and Efficient Coded Multi-Access Edge Computing With Generalized Graph Neural Networks. IEEE Trans. Mob. Comput. 22(9): 5504-5524 (2023) - 2022
- [j30]Zineddine Kouahla, Ala-Eddine Benrazek, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi, Muhammet Kurulay, Adeel Anjum, Alia Asheralieva:
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues. Future Internet 14(1): 19 (2022) - [j29]Alia Asheralieva, Dusit Niyato:
Optimizing Age of Information and Security of the Next-Generation Internet of Everything Systems. IEEE Internet Things J. 9(20): 20331-20351 (2022) - [j28]Syed Atif Moqurrab, Noshina Tariq, Adeel Anjum, Alia Asheralieva, Saif Ur Rehman Malik, Hassan Malik, Haris Pervaiz, Sukhpal Singh Gill:
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126(3): 2379-2401 (2022) - [c15]Hulin Yang, Alia Asheralieva, Jin Zhang, Md. Monjurul Karim, Dusit Niyato, Khuhawar Arif Raza:
User-Centric Blockchain for Industry 5.0 Applications. ICC Workshops 2022: 25-30 - [c14]Weiquan Ni, Shaoliang Zhu, Md. Monjurul Karim, Alia Asheralieva, Jiawen Kang, Zehui Xiong, Carsten Maple:
Lagrange Coded Federated Learning (L-CoFL) Model for Internet of Vehicles. ICDCS 2022: 864-872 - 2021
- [j27]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Sajjad Haider, Abid Khan, Umar Manzoor, Alia Asheralieva:
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 105: 102224 (2021) - [j26]Jer Shyuan Ng, Wei Yang Bryan Lim, Nguyen Cong Luong, Zehui Xiong, Alia Asheralieva, Dusit Niyato, Cyril Leung, Chunyan Miao:
A Comprehensive Survey on Coded Distributed Computing: Fundamentals, Challenges, and Networking Applications. IEEE Commun. Surv. Tutorials 23(3): 1800-1837 (2021) - [j25]Tehsin Kanwal, Adeel Anjum, Abid Khan, Alia Asheralieva, Gwanggil Jeon:
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j24]Alia Asheralieva, Dusit Niyato:
Throughput-Efficient Lagrange Coded Private Blockchain for Secured IoT Systems. IEEE Internet Things J. 8(19): 14874-14895 (2021) - [j23]Hasina Attaullah, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, Muhammad Ali Imran:
F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 21(14): 4933 (2021) - [j22]Alia Asheralieva, Dusit Niyato:
Bayesian Reinforcement Learning and Bayesian Deep Learning for Blockchains With Mobile Edge Computing. IEEE Trans. Cogn. Commun. Netw. 7(1): 319-335 (2021) - [j21]Alia Asheralieva:
Optimal Computational Offloading and Content Caching in Wireless Heterogeneous Mobile Edge Computing Systems With Hopfield Neural Networks. IEEE Trans. Emerg. Top. Comput. Intell. 5(3): 407-425 (2021) - [j20]Alia Asheralieva, Dusit Niyato:
Learning-Based Mobile Edge Computing Resource Management to Support Public Blockchain Networks. IEEE Trans. Mob. Comput. 20(3): 1092-1109 (2021) - [j19]Alia Asheralieva, Dusit Niyato:
Fast and Secure Computational Offloading With Lagrange Coded Mobile Edge Computing. IEEE Trans. Veh. Technol. 70(5): 4924-4942 (2021) - [c13]Weiquan Ni, Jiawen Kang, Carsten Maple, Zehui Xiong, Alia Asheralieva:
Fast and Secure Consortium Blockchains with Lightweight Block Verifiers. BCCA 2021: 11-18 - [c12]Muhammad Rizwan, Muhammad Noman Sohail, Alia Asheralieva, Adeel Anjum, Pelin Angin:
SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System. Blockchain 2021: 530-537 - [c11]Weiquan Ni, Alia Asheralieva, Carsten Maple, Md. Monjurul Karim, Dusit Niyato, Qiang Yan:
Throughput-Efficient Blockchain for Internet-of-Vehicles. GLOBECOM (Workshops) 2021: 1-6 - [c10]Shaoliang Zhu, Alia Asheralieva, Md. Monjurul Karim, Dusit Niyato, Khuhawar Arif Raza:
Secure Federated Learning Based on Coded Distributed Computing. GLOBECOM (Workshops) 2021: 1-7 - [c9]Khuhawar Arif Raza, Alia Asheralieva, Md. Monjurul Karim, Kashif Sharif, Mehdi Gheisari, Salabat Khan:
A Novel Forwarding and Caching Scheme for Information-Centric Software-Defined Networks. ISNCC 2021: 1-8 - 2020
- [j18]Alia Asheralieva, Dusit Niyato:
Distributed Dynamic Resource Management and Pricing in the IoT Systems With Blockchain-as-a-Service and UAV-Enabled Mobile Edge Computing. IEEE Internet Things J. 7(3): 1974-1993 (2020) - [j17]Alia Asheralieva, Dusit Niyato:
Reputation-Based Coalition Formation for Secure Self-Organized and Scalable Sharding in IoT Blockchains With Mobile-Edge Computing. IEEE Internet Things J. 7(12): 11830-11850 (2020) - [j16]Alia Asheralieva, Dusit Niyato:
Combining Contract Theory and Lyapunov Optimization for Content Sharing With Edge Caching and Device-to-Device Communications. IEEE/ACM Trans. Netw. 28(3): 1213-1226 (2020) - [c8]Mehdi Gheisari, Aaqif Afzaal Abbasi, Zahra Sayari, Qasim Rizvi, Alia Asheralieva, Sabitha Banu A., Feras M. Awaysheh, Syed Bilal Hussain Shah, Khuhawar Arif Raza:
A Survey on Clustering Algorithms in Wireless Sensor Networks: Challenges, Research, and Trends. ICS 2020: 294-299 - [i1]Jer Shyuan Ng, Wei Yang Bryan Lim, Nguyen Cong Luong, Zehui Xiong, Alia Asheralieva, Dusit Niyato, Cyril Leung, Chunyan Miao:
A Survey of Coded Distributed Computing. CoRR abs/2008.09048 (2020)
2010 – 2019
- 2019
- [j15]Alia Asheralieva, Dusit Niyato:
Hierarchical Game-Theoretic and Reinforcement Learning Framework for Computational Offloading in UAV-Enabled Mobile Edge Computing Networks With Multiple Service Providers. IEEE Internet Things J. 6(5): 8753-8769 (2019) - [j14]Alia Asheralieva, Dusit Niyato:
Game Theory and Lyapunov Optimization for Cloud-Based Content Delivery Networks With Device-to-Device and UAV-Enabled Caching. IEEE Trans. Veh. Technol. 68(10): 10094-10110 (2019) - 2018
- [j13]Alia Asheralieva, Tony Q. S. Quek, Dusit Niyato:
An Asymmetric Evolutionary Bayesian Coalition Formation Game for Distributed Resource Sharing in a Multi-Cell Device-to-Device Enabled Cellular Network. IEEE Trans. Wirel. Commun. 17(6): 3752-3767 (2018) - 2017
- [j12]Alia Asheralieva, Yoshikazu Miyanaga:
Optimal Contract Design for Joint User Association and Intercell Interference Mitigation in Heterogeneous LTE-A Networks With Asymmetric Information. IEEE Trans. Veh. Technol. 66(6): 5284-5300 (2017) - [j11]Alia Asheralieva:
Bayesian Reinforcement Learning-Based Coalition Formation for Distributed Resource Sharing by Device-to-Device Users in Heterogeneous Cellular Networks. IEEE Trans. Wirel. Commun. 16(8): 5016-5032 (2017) - 2016
- [j10]Alia Asheralieva, Yoshikazu Miyanaga:
Effective resource block allocation procedure for quality of service provisioning in a single-operator heterogeneous LTE-A network. Comput. Networks 108: 1-14 (2016) - [j9]Alia Asheralieva, Yoshikazu Miyanaga:
Dynamic Resource Allocation with Integrated Reinforcement Learning for a D2D-Enabled LTE-A Network with Access to Unlicensed Band. Mob. Inf. Syst. 2016: 4565203:1-4565203:18 (2016) - [j8]Alia Asheralieva, Yoshikazu Miyanaga:
Joint Bandwidth and Power Allocation for LTE-Based Cognitive Radio Network Based on Buffer Occupancy. Mob. Inf. Syst. 2016: 6306580:1-6306580:23 (2016) - [j7]Alia Asheralieva, Yoshikazu Miyanaga:
Dynamic Buffer Status-Based Control for LTE-A Network With Underlay D2D Communication. IEEE Trans. Commun. 64(3): 1342-1355 (2016) - [j6]Alia Asheralieva, Yoshikazu Miyanaga:
An Autonomous Learning-Based Algorithm for Joint Channel and Power Level Selection by D2D Pairs in Heterogeneous Cellular Networks. IEEE Trans. Commun. 64(9): 3996-4012 (2016) - [j5]Alia Asheralieva, Yoshikazu Miyanaga:
QoS-Oriented Mode, Spectrum, and Power Allocation for D2D Communication Underlaying LTE-A Network. IEEE Trans. Veh. Technol. 65(12): 9787-9800 (2016) - [c7]Alia Asheralieva, Yoshikazu Miyanaga:
Multi-agent Q-learning for autonomous D2D communication. ISPACS 2016: 1-6 - 2015
- [j4]Alia Asheralieva, Kaushik Mahata:
Resource allocation for LTE-based cognitive radio network with queue stability and interference constraints. Phys. Commun. 14: 1-13 (2015) - 2014
- [j3]Alia Asheralieva, Kaushik Mahata:
A two-step resource allocation procedure for LTE-based cognitive radio network. Comput. Networks 59: 137-152 (2014) - [j2]Alia Asheralieva, Kaushik Mahata:
Joint power and bandwidth allocation in IEEE802.22 based cognitive LTE network. Comput. Networks 71: 117-129 (2014) - [c6]Alia Asheralieva, Kaushik Mahata, Jamil Y. Khan:
Delay Aware Resource Allocation Scheme for a Cognitive LTE Based Radio Network. MASS 2014: 242-246 - 2013
- [c5]Alia Asheralieva:
Prediction based bandwidth allocation for cognitive LTE network. WCNC 2013: 801-806 - [c4]Alia Asheralieva, Kaushik Mahata, Jamil Y. Khan:
Delay and Loss Due to Uplink Packet Scheduling in LTE Network. WiFlex 2013: 1-12 - 2012
- [j1]Alia Asheralieva, Jamil Y. Khan, Kaushik Mahata:
Performance of LTE network for VoIP users. Int. J. Internet Protoc. Technol. 7(1): 3-14 (2012) - [c3]Alia Asheralieva, Jamil Y. Khan, Kaushik Mahata:
Dynamic resource allocation in a LTE/WLAN heterogeneous network. ICUMT 2012: 89-95 - 2011
- [c2]Alia Asheralieva, Jamil Y. Khan, Kaushik Mahata:
Performance analysis of VoIP services on the LTE network. ATNAC 2011: 1-6 - [c1]Alia Asheralieva, Jamil Y. Khan, Kaushik Mahata:
Traffic prediction based packet transmission priority technique in an infrastructure wireless network. WCNC 2011: 404-409
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint