Article
Computer Science, Information Systems
Hongzhi Guo, Jingyi Li, Jiajia Liu, Na Tian, Nei Kato
Summary: Space-air-ground-sea integrated network (SAGSIN), as a promising network architecture for 6G, faces unprecedented security challenges. This paper provides a detailed survey on the recent progress and ongoing research on SAGSIN security, covering security threats, attack methodologies, and defense countermeasures. Unlike existing surveys, this paper presents a comprehensive overview of the security status of the entire SAGSIN network.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Hardware & Architecture
Liang Huang, Xu Feng, Anqi Feng, Yupin Huang, Li Ping Qian
Summary: This paper proposes a deep learning-based algorithm to solve the offloading decision problem in mobile edge computing networks. By using multiple parallel DNNs to generate offloading decisions and utilizing a shared replay memory to further train and improve DNNs, near-optimal offloading decisions can be generated quickly.
MOBILE NETWORKS & APPLICATIONS
(2022)
Article
Computer Science, Artificial Intelligence
Laura von Rueden, Sebastian Mayer, Katharina Beckh, Bogdan Georgiev, Sven Giesselbach, Raoul Heese, Birgit Kirsch, Julius Pfrommer, Annika Pick, Rajkumar Ramamurthy, Michal Walczak, Jochen Garcke, Christian Bauckhage, Jannis Schuecker
Summary: Despite the success of machine learning, it has limitations when dealing with insufficient training data. Informed machine learning, which integrates prior knowledge into the training process, is a potential solution. This paper provides a structured overview of various approaches in this field, defines informed machine learning, and introduces a taxonomy for classification. The evaluation of numerous papers based on this taxonomy uncovers key methods in the field.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2023)
Article
Computer Science, Information Systems
Xiaokang Zhou, Wei Liang, Weimin Li, Ke Yan, Shohei Shimizu, Kevin I-Kai Wang
Summary: The study introduces a novel adversarial attack generation method to degrade the classification precision of intelligent intrusion detection in IoT systems by identifying critical feature elements and minimal perturbations. The method also develops a hierarchical node selection algorithm based on random walk with restart to select more vulnerable nodes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Dezhi Han, Nannan Pan, Kuan-Ching Li
Summary: The proposed CP-ABE scheme in this article achieves revocation, white-box traceability, and the application of hidden policy. The ciphertext is composed of two parts: the access policy encrypted by attribute value and the revocation information related to a binary tree. The scheme is proven to be IND-CPA secure, efficient, and promising in the standard model.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Chaosheng Feng, Bin Liu, Zhen Guo, Keping Yu, Zhiguang Qin, Kim-Kwang Raymond Choo
Summary: This article proposes a blockchain-based cross-domain authentication scheme for intelligent 5G-enabled Internet of drones. By utilizing multiple signatures and smart contracts to establish an identity federation for collaborative domains, the scheme supports domain joining and exiting, and ensures reliable communication between cross-domain devices.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Wu Deng, Lirong Zhang, Xiangbing Zhou, Yongquan Zhou, Yuzhu Sun, Weihong Zhu, Huayue Chen, Wuquan Deng, Huiling Chen, Huimin Zhao
Summary: The study proposed a multi-strategy particle swarm and ant colony hybrid optimization algorithm (MPSACO) to solve airport taxiway planning problems, aiming to enhance resource utilization efficiency and reduce conflicts through optimization algorithms.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Nripendra P. Rana, Sheshadri Chatterjee, Yogesh K. Dwivedi, Shahriar Akter
Summary: The study examines the impact of AI-integrated business analytics on a firm's competitive advantage, finding that opacity, suboptimal business decisions, and perceived risk may result in operational inefficiency and competitive disadvantage.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
An Liu, Zhe Huang, Min Li, Yubo Wan, Wenrui Li, Tony Xiao Han, Chenchen Liu, Rui Du, Danny Kai Pin Tan, Jianmin Lu, Yuan Shen, Fabiola Colone, Kevin Chetty
Summary: Integrated Sensing and Communication (ISAC) is a key technology in future wireless systems, as it combines high-performance sensing and wireless communications in the same frequency band and hardware. ISAC has attracted significant research interest and attention in both academia and industry, considering the requirements of various applications in 5G and beyond. Understanding the fundamental limits of ISAC is crucial for developing better ISAC technologies that approach the performance limits.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Zhaolong Ning, Peiran Dong, Xiaojie Wang, Xiping Hu, Jiangchuan Liu, Lei Guo, Bin Hu, Ricky Y. K. Kwok, Victor C. M. Leung
Summary: This study proposes an efficient partial computation offloading and adaptive task scheduling algorithm for 5G-enabled vehicular networks, considering the incentive compatibility and individual rationality of vehicular users, with the aim of maximizing the overall system-wide profit.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Pallavi Pandey, K. R. Seeja
Summary: Emotion recognition from EEG is important in subject-independent situations. This paper proposes a subject-independent emotion recognition technique using VMD and Deep Neural Network, and achieves better performance compared to state-of-the-art techniques, as validated by the DEAP dataset.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Jiguo Li, Hao Yan, Yichen Zhang
Summary: To increase the availability and durability of outsourced data, many customers store multiple copies on multiple cloud servers. Existing PDP protocols mainly focus on single-copy storage and rely on PKI technique, which has security vulnerabilities and high communication/computational costs. In this paper, we propose a novel identity-based PDP scheme for multi-copy on multiple cloud storage servers, achieving both security and efficiency.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Computer Science, Information Systems
Yufeng Zhan, Jie Zhang, Zicong Hong, Leijie Wu, Peng Li, Song Guo
Summary: This article discusses the incentive mechanism design for federated learning, focusing on the classification of existing incentive mechanisms and comparing different approaches. It also explores future directions for incentivizing clients in federated learning.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2022)
Article
Computer Science, Artificial Intelligence
Di Jin, Zhizhi Yu, Pengfei Jiao, Shirui Pan, Dongxiao He, Jia Wu, Philip S. Yu, Weixiong Zhang
Summary: Community detection is a fundamental task in network analysis, aiming to partition a network into sub-structures to reveal their latent functions. Traditional approaches utilize probabilistic graphical models, while new approaches use deep learning to convert networked data into low dimensional representation. There is a lack of understanding of the theoretical and methodological underpinnings of community detection, which is critical for the future development of network analysis.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2023)
Article
Computer Science, Information Systems
Lianbo Ma, Xueyi Wang, Xingwei Wang, Liang Wang, Ying Shi, Min Huang
Summary: This paper proposes a truthful combinatorial double auction mechanism for the mobile edge computing system, which guarantees truthfulness and budget-balance. The mechanism considers the locality characteristics of the MEC system and achieves optimal allocation and pricing using padding method and efficient pricing strategy.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Jiagang Liu, Ju Ren, Yongmin Zhang, Xuhong Peng, Yaoxue Zhang, Yuanyuan Yang
Summary: In this paper, a dependent task offloading framework (COFE) is proposed, which allows mobile devices to offload compute-intensive tasks with dependent constraints to the MEC-Cloud system to improve user experience. The task offloading problem is formulated as an average makespan minimization problem, and a heuristic ranking-based algorithm is proposed to assign the offloaded tasks. Theoretical analysis proves the stability of the system under the proposed algorithm, and extensive simulations validate its effectiveness in reducing average makespan and deadline violation probabilities.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Shengnan Guo, Youfang Lin, Huaiyu Wan, Xiucheng Li, Gao Cong
Summary: Accurate traffic forecasting is crucial for intelligent transportation systems, but it still faces challenges in modeling the dynamics of traffic data and capturing the periodicity and spatial heterogeneity. In this paper, an Attention based Spatial-Temporal Graph Neural Network (ASTGNN) is proposed to overcome these challenges, and experimental results show that ASTGNN outperforms existing baselines.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2022)
Proceedings Paper
Computer Science, Artificial Intelligence
Andreas Holzinger, Anna Saranti, Christoph Molnar, Przemyslaw Biecek, Wojciech Samek
Summary: This article provides a brief overview of selected methods in the field of Explainable Artificial Intelligence (xAI), aiming to give beginners a quick summary of the current state of the art.
XXAI - BEYOND EXPLAINABLE AI: International Workshop, Held in Conjunction with ICML 2020, July 18, 2020, Vienna, Austria, Revised and Extended Papers
(2022)
Article
Computer Science, Information Systems
Yun Li, Shichao Xia, Mengyan Zheng, Bin Cao, Qilie Liu
Summary: In order to improve mobile users' service experience, careful design of offloading policy is necessary in mobile cloud computing. This paper investigates the offloading policy in heterogeneous wireless networks by formulating the mobile users' workload offloading problem and proposing optimization frameworks and methods. Experimental results show the effectiveness of the proposed methods for deterministic and random WiFi connections.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Article
Computer Science, Information Systems
Mojtaba Vaezi, Amin Azari, Saeed R. Khosravirad, Mahyar Shirvanimoghaddam, M. Mahdi Azari, Danai Chasaki, Petar Popovski
Summary: This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence. It also discusses the potential of using emerging deep learning and federated learning techniques for enhancing the efficiency and security of IoT communication.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)