Telecommunications

Review Computer Science, Artificial Intelligence

Artificial intelligence in disease diagnosis: a systematic literature review, synthesizing framework and future research agenda

Yogesh Kumar, Apeksha Koul, Ruchi Singla, Muhammad Fazal Ijaz

Summary: Artificial intelligence plays a significant role in disease diagnosis, drug discovery, and patient risk identification in healthcare. This article provides a comprehensive survey on the use of artificial intelligence techniques for diagnosing various diseases and compares the quality parameters of different studies.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2022)

Article Computer Science, Information Systems

Extended Feature Pyramid Network for Small Object Detection

Chunfang Deng, Mengmeng Wang, Liang Liu, Yong Liu, Yunliang Jiang

Summary: In this paper, the authors propose an extended feature pyramid network (EFPN) for small object detection. They introduce a feature texture transfer (FTT) module for super-resolving features and extracting regional details, as well as a cross resolution distillation mechanism to enhance the network's ability to perceive details. Experimental results show that the proposed EFPN is computationally and memory efficient, and achieves state-of-the-art results on small object detection datasets.

IEEE TRANSACTIONS ON MULTIMEDIA (2022)

Article Computer Science, Artificial Intelligence

Fermatean fuzzy CRITIC-EDAS approach for the selection of sustainable third-party reverse logistics providers using improved generalized score function

Arunodaya Raj Mishra, Pratibha Rani Bullet, Kiran Pandey

Summary: The paper introduces a hybrid methodology based on Fermate fuzzy sets to solve the S3PRLP selection problem, which can handle unknown attributes and decision makers' weights. The framework combines CRITIC and EDAS methods, demonstrating good performance in a case study and showing its practicality and feasibility.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2022)

Article Computer Science, Information Systems

Particle Swarm Optimization: A Comprehensive Survey

Tareq M. Shami, Ayman A. El-Saleh, Mohammed Alswaitti, Qasem Al-Tashi, Mhd Amen Summakieh, Seyedali Mirjalili

Summary: This paper provides a comprehensive review of particle swarm optimization (PSO), including its basic concepts, variants, applications, and drawbacks. It also reviews research on utilizing PSO to solve feature selection problems and presents potential research directions.

IEEE ACCESS (2022)

Article Engineering, Aerospace

SLNR-Based Secure Energy Efficient Beamforming in Multibeam Satellite Systems

Zhi Lin, Kang An, Hehao Niu, Yihua Hu, Symeon Chatzinotas, Gan Zheng, Jiangzhou Wang

Summary: This letter investigates secure energy efficient beamforming in multibeam satellite systems. An alternating optimization scheme is proposed to maximize the system secrecy energy efficiency. Simulations are provided to verify the superiority of the proposed scheme.

IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS (2023)

Article Computer Science, Information Systems

Beyond Triplet Loss: Person Re-Identification With Fine-Grained Difference-Aware Pairwise Loss

Cheng Yan, Guansong Pang, Xiao Bai, Changhong Liu, Xin Ning, Lin Gu, Jun Zhou

Summary: Person Re-Identification aims to re-identify individuals from different viewpoints using fine-grained appearance differences. A novel pairwise loss function is introduced to enable learning of fine-grained features by penalizing small differences exponentially and large differences moderately. Experimental results show that the proposed loss outperforms popular loss functions and enhances data efficiency.

IEEE TRANSACTIONS ON MULTIMEDIA (2022)

Article Telecommunications

DL-IDS: a deep learning-based intrusion detection framework for securing IoT

Yazan Otoum, Dandan Liu, Amiya Nayak

Summary: The Internet of Things (IoT) is made up of devices connected through wired or wireless networks, and security is a critical issue. To address this, we propose a new deep learning-based intrusion detection system that can detect security threats in IoT environments more accurately.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Information Systems

A Survey on Millimeter-Wave Beamforming Enabled UAV Communications and Networking

Zhenyu Xiao, Lipeng Zhu, Yanming Liu, Pengfei Yi, Rui Zhang, Xiang-Gen Xia, Robert Schober

Summary: This paper provides a comprehensive survey on mmWave beamforming enabled UAV communications and networking, including the technical potential, challenges, technologies, and solutions. It also presents open issues and promising directions for future research in mmWave beamforming enabled UAV communications and networking.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Telecommunications

Trust based energy efficient data collection with unmanned aerial vehicle in edge network

Bo Jiang, Guosheng Huang, Tian Wang, Jinsong Gui, Xiaoyu Zhu

Summary: In this article, a trust-based energy efficient data collection scheme using unmanned aerial vehicles is proposed, which optimizes trajectory and identifies trusted data to prolong network lifetime and improve data collection quality.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Engineering, Electrical & Electronic

Deep Residual Learning for Channel Estimation in Intelligent Reflecting Surface-Assisted Multi-User Communications

Chang Liu, Xuemeng Liu, Derrick Wing Kwan Ng, Jinhong Yuan

Summary: Channel estimation is a critical task in IRS-MUC systems, and this paper proposes a deep residual learning approach to address the challenges of cascaded channel with a sophisticated statistical distribution. By modeling the channel estimation as a denoising problem, a convolutional neural network based on deep residual learning is designed to recover the channel coefficients. The proposed method achieves similar performance as the optimal MMSE estimator, but without the requirement of prior probability density function of channel.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Dynamic Scheduling for Stochastic Edge-Cloud Computing Environments Using A3C Learning and Residual Recurrent Neural Networks

Shreshth Tuli, Shashikant Ilager, Kotagiri Ramamohanarao, Rajkumar Buyya

Summary: The study introduces a real-time scheduler based on A3C for decentralized learning in Edge-Cloud environments across multiple agents. By utilizing the R2N2 architecture to capture various parameters and temporal patterns, it provides efficient scheduling decisions and selects hyperparameters through sensitivity analysis.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

Energy-Efficient Smart Routing Based on Link Correlation Mining for Wireless Edge Computing in IoT

Xiaokang Zhou, Xiang Yang, Jianhua Ma, Kevin I-Kai Wang

Summary: This article introduces an intelligent edge computing method based on link correlation, which improves the energy efficiency of wireless IoT infrastructure through network coding and opportunistic routing. The method reduces unnecessary data transmission and achieves more energy-efficient communications.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

QoE-Aware Efficient Content Distribution Scheme For Satellite-Terrestrial Networks

Dingde Jiang, Feng Wang, Zhihan Lv, Shahid Mumtaz, Saba Al-Rubaye, Antonios Tsourdos, Octavia Dobre

Summary: This article proposes a user-oriented content distribution scheme for satellite-terrestrial networks (STN) to improve content distribution efficiency. The scheme includes algorithms for network division, caching satellite deployment, cache node selection, and content updating mechanism. Simulation results demonstrate that the scheme can reduce propagation delay and network load under different network conditions and has stability and self-adaptability.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems

Wei Liang, Lijun Xiao, Ke Zhang, Mingdong Tang, Dacheng He, Kuan-Ching Li

Summary: This article proposes a collaborative clustering-characteristic-based data fusion approach for intrusion detection in a Blockchain-based system. By using mathematical and AI models to train and analyze data, it accurately detects abnormal intrusion behavior.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design

Xiaowei Pang, Nan Zhao, Jie Tang, Celimuge Wu, Dusit Niyato, Kai-Kit Wong

Summary: In this paper, the authors investigate the secure transmission design for an IRS-assisted UAV network in the presence of an eavesdropper. By jointly optimizing the trajectory of UAV, the transmit beamforming, and the phase shift of IRS, the average secrecy rate is maximized. The proposed scheme decomposes the problem into three sub-problems and solves them iteratively, achieving performance improvement in secure transmission.

IEEE TRANSACTIONS ON COMMUNICATIONS (2022)

Article Computer Science, Information Systems

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

Hongzhi Guo, Jingyi Li, Jiajia Liu, Na Tian, Nei Kato

Summary: Space-air-ground-sea integrated network (SAGSIN), as a promising network architecture for 6G, faces unprecedented security challenges. This paper provides a detailed survey on the recent progress and ongoing research on SAGSIN security, covering security threats, attack methodologies, and defense countermeasures. Unlike existing surveys, this paper presents a comprehensive overview of the security status of the entire SAGSIN network.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Hardware & Architecture

Distributed Deep Learning-based Offloading for Mobile Edge Computing Networks

Liang Huang, Xu Feng, Anqi Feng, Yupin Huang, Li Ping Qian

Summary: This paper proposes a deep learning-based algorithm to solve the offloading decision problem in mobile edge computing networks. By using multiple parallel DNNs to generate offloading decisions and utilizing a shared replay memory to further train and improve DNNs, near-optimal offloading decisions can be generated quickly.

MOBILE NETWORKS & APPLICATIONS (2022)

Article Computer Science, Information Systems

Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System

Xiaokang Zhou, Wei Liang, Weimin Li, Ke Yan, Shohei Shimizu, Kevin I-Kai Wang

Summary: The study introduces a novel adversarial attack generation method to degrade the classification precision of intelligent intrusion detection in IoT systems by identifying critical feature elements and minimal perturbations. The method also develops a hierarchical node selection algorithm based on random walk with restart to select more vulnerable nodes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones

Chaosheng Feng, Bin Liu, Zhen Guo, Keping Yu, Zhiguang Qin, Kim-Kwang Raymond Choo

Summary: This article proposes a blockchain-based cross-domain authentication scheme for intelligent 5G-enabled Internet of drones. By utilizing multiple signatures and smart contracts to establish an identity federation for collaborative domains, the scheme supports domain joining and exiting, and ensures reliable communication between cross-domain devices.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A Survey on Fundamental Limits of Integrated Sensing and Communication

An Liu, Zhe Huang, Min Li, Yubo Wan, Wenrui Li, Tony Xiao Han, Chenchen Liu, Rui Du, Danny Kai Pin Tan, Jianmin Lu, Yuan Shen, Fabiola Colone, Kevin Chetty

Summary: Integrated Sensing and Communication (ISAC) is a key technology in future wireless systems, as it combines high-performance sensing and wireless communications in the same frequency band and hardware. ISAC has attracted significant research interest and attention in both academia and industry, considering the requirements of various applications in 5G and beyond. Understanding the fundamental limits of ISAC is crucial for developing better ISAC technologies that approach the performance limits.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)