相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Information Systems
Lunyuan Chen et al.
Summary: This paper investigates intelligent ubiquitous computing for future UAV-enabled MEC systems, optimizing system performance using reinforcement learning and transfer learning algorithms to reduce latency and energy consumption. Reinforcement learning is used to devise offloading strategy meeting constraints and alleviate effects of jamming attack, while transfer learning speeds up training process and enhances reinforcement learning performance. Simulation results show proposed offloading strategy outperforms conventional methods, and using transfer learning achieves better system performance with significantly reduced training time.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Telecommunications
Mukesh Soni et al.
Summary: This paper addresses security issues in mobile node data transmission in smart cities and proposes a secure and efficient communication scheme to protect user identity privacy. Security evaluations are conducted to confirm the strengths of the proposed protocol against various attacks. Performance analysis and comparison with other relevant communication mechanisms are also discussed.
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Sandeep Kumar Sood et al.
Summary: This paper introduces a fog-assisted cyber physical system to control panic attacks and COVID-19 infection risk in public places. By utilizing the concept of physical and cyber space, the model determines panic health and COVID-19 symptoms, predicts risks, and plans evacuation routes efficiently. The system provides timely and efficient evacuation prioritizing risk-affected areas, protecting people from panic attacks and COVID-19 infection.
COMPUTER COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Ke He et al.
Summary: This paper proposes a novel ML detection framework that effectively approximates unknown noise distribution through normalizing flow to achieve robust signal detection and recovery in MIMO systems. Simulation results show its superiority in non-analytical noise environments over existing algorithms, while reaching the ML performance bound in analytical noise environments.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Proceedings Paper
Computer Science, Information Systems
Muhammad Aminu Lawal et al.
Summary: This paper proposes a DDoS mitigation framework for IoT using fog computing to address security concerns and evaluates the framework's accuracy in detecting DDoS attacks.
LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G
(2021)
Article
Computer Science, Information Systems
Abdullah Ahmed Bahashwan et al.
Summary: The research proposes a flow-based approach to detect abnormal NDP traffic behavior for identifying RA and NS DoS flooding attacks. Experimental results show that the proposed approach performs well in terms of detection accuracy, precision, recall, and F1-Score, and outperforms other existing methods significantly.
Proceedings Paper
Telecommunications
Chia-Wei Tseng et al.
APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS)
(2020)
Article
Computer Science, Information Systems
Ahmed K. Al-Ani et al.
Article
Computer Science, Artificial Intelligence
Gaurav Dhiman et al.
KNOWLEDGE-BASED SYSTEMS
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Kazuya Kishimoto et al.
2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY)
(2012)