Article
Computer Science, Information Systems
Zhaolong Ning, Peiran Dong, Xiaojie Wang, Xiping Hu, Jiangchuan Liu, Lei Guo, Bin Hu, Ricky Y. K. Kwok, Victor C. M. Leung
Summary: This study proposes an efficient partial computation offloading and adaptive task scheduling algorithm for 5G-enabled vehicular networks, considering the incentive compatibility and individual rationality of vehicular users, with the aim of maximizing the overall system-wide profit.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Yufeng Zhan, Jie Zhang, Zicong Hong, Leijie Wu, Peng Li, Song Guo
Summary: This article discusses the incentive mechanism design for federated learning, focusing on the classification of existing incentive mechanisms and comparing different approaches. It also explores future directions for incentivizing clients in federated learning.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2022)
Article
Computer Science, Information Systems
Lianbo Ma, Xueyi Wang, Xingwei Wang, Liang Wang, Ying Shi, Min Huang
Summary: This paper proposes a truthful combinatorial double auction mechanism for the mobile edge computing system, which guarantees truthfulness and budget-balance. The mechanism considers the locality characteristics of the MEC system and achieves optimal allocation and pricing using padding method and efficient pricing strategy.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Jiagang Liu, Ju Ren, Yongmin Zhang, Xuhong Peng, Yaoxue Zhang, Yuanyuan Yang
Summary: In this paper, a dependent task offloading framework (COFE) is proposed, which allows mobile devices to offload compute-intensive tasks with dependent constraints to the MEC-Cloud system to improve user experience. The task offloading problem is formulated as an average makespan minimization problem, and a heuristic ranking-based algorithm is proposed to assign the offloaded tasks. Theoretical analysis proves the stability of the system under the proposed algorithm, and extensive simulations validate its effectiveness in reducing average makespan and deadline violation probabilities.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Liang Tan, Keping Yu, Fangpeng Ming, Xiaofan Cheng, Gautam Srivastava
Summary: This article proposes a HoneyNet approach for enhancing the security of AIoT by combining threat detection and situational awareness. Experimental results demonstrate the feasibility and effectiveness of the proposed solution.
IEEE CONSUMER ELECTRONICS MAGAZINE
(2022)
Article
Engineering, Electrical & Electronic
Latif U. Khan, Walid Saad, Dusit Niyato, Zhu Han, Choong Seon Hong
Summary: The article discusses the framework requirements for enabling IoE applications over 6G wireless systems using digital twins. It presents the architectural components and trends of edge-based, cloud-based, and edge-cloud-based twins, and provides a comparative description of various twins. The article concludes with recommendations for future research directions.
IEEE COMMUNICATIONS MAGAZINE
(2022)
Article
Computer Science, Information Systems
Mojtaba Vaezi, Amin Azari, Saeed R. Khosravirad, Mahyar Shirvanimoghaddam, M. Mahdi Azari, Danai Chasaki, Petar Popovski
Summary: This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence. It also discusses the potential of using emerging deep learning and federated learning techniques for enhancing the efficiency and security of IoT communication.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Bimal Ghimire, Danda B. Rawat
Summary: This article discusses the decentralized paradigm in the field of cybersecurity and machine learning for the emerging Internet of Things (IoT). It highlights the concept of federated cybersecurity (FC) and the application of federated learning (FL) in securing the IoT environment. The article also explores the performance issues and future research trends in this area.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Xuemin Shen, Jie Gao, Wen Wu, Mushu Li, Conghao Zhou, Weihua Zhuang
Summary: This tutorial paper examines the evolution and future prospects of network architecture, presenting a novel conceptual architecture for 6th generation (6G) networks. The proposed architecture incorporates holistic network virtualization and pervasive artificial intelligence (AI) to enhance flexibility, scalability, adaptivity, and intelligence in 6G networks.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Mohammad Alibakhshikenari, Esraa Mousa Ali, Mohammad Soruri, Mariana Dalarsson, Mohammad Naser-Moghadasi, Bal S. Virdee, Caslav Stefanovic, Anna Pietrenko-Dabrowska, Slawomir Koziel, Stanislaw Szczepanski, Ernesto Limiti
Summary: On-chip antennas are small, miniaturized radiating elements that can be integrated inside electronic devices. Recent techniques and technologies have been investigated to improve the performance of on-chip antennas for millimeter-waves and terahertz applications.
Article
Computer Science, Information Systems
Seong-Taek Park, Chang Liu
Summary: This study identifies the best tour route for foreign tourists in South Korea by analyzing reviews and utilizing text mining technique and network analysis. Customized travel routes are suggested for convenient use among travelers.
PERSONAL AND UBIQUITOUS COMPUTING
(2022)
Article
Computer Science, Information Systems
Sohaib A. Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band
Summary: The Internet of Things (IoT) is an emerging technology crucial to many aspects of social life, but faces challenges such as interoperability, compatibility, security, and energy efficiency in its wide deployment.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Huan Zhou, Kai Jiang, Xuxun Liu, Xiuhua Li, Victor C. M. Leung
Summary: This article investigates the joint optimization of computation offloading and resource allocation in a dynamic multiuser Mobile-edge computing (MEC) system. The objective is to minimize the energy consumption of the entire MEC system by considering the delay constraint and uncertain resource requirements of heterogeneous computation tasks. The proposed reinforcement learning method and double deep Q network-based method outperform other baseline methods in different scenarios.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Bomin Mao, Fengxiao Tang, Yuichi Kawamoto, Nei Kato
Summary: Green communications are crucial for reducing energy overhead and fossil fuel usage in the information industry. With the advent of 5G and future 6G eras, the demand for green communications becomes even more urgent. Artificial Intelligence (AI) is recognized as the only solution to meet the stringent requirements of 6G while improving energy efficiency and network management. This paper provides an overview of AI-based green communications and discusses the potential research issues for AI models in the green 6G era.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Li Yang, Abdallah Moubayed, Abdallah Shami
Summary: Modern vehicles, including connected vehicles and autonomous vehicles, are vulnerable to cyber-attacks due to their increasing functionality and connectivity. To secure vehicular networks, researchers propose a hybrid intrusion detection system that can detect both known and unknown attacks.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Keping Yu, Liang Tan, Caixia Yang, Kim-Kwang Raymond Choo, Ali Kashif Bashir, Joel J. P. C. Rodrigues, Takuro Sato
Summary: This solution proposes using Shamir threshold cryptography and blockchain technology to protect IIoT data, effectively preventing data leakage and attackers from stealing data, ensuring the security of the encryption key.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Feng Ding, Guopu Zhu, Mamoun Alazab, Xiangjun Li, Keping Yu
Summary: The upcoming 5G HetNets have attracted worldwide attention due to their ability to transport large amounts of high-velocity data. However, there are also concerns regarding the security of visual information channels. In this paper, a novel framework based on deep learning is proposed as a digital forensics tool to protect end users. The proposed model shows improved data collection efficiency, robustness, and detection performance compared to conventional methods. With the assistance of 5G HetNets, the framework can provide high-quality real-time forensics services on consumer devices, which is of significant practical value.
IEEE CONSUMER ELECTRONICS MAGAZINE
(2022)
Article
Computer Science, Information Systems
Beixiong Zheng, Changsheng You, Weidong Mei, Rui Zhang
Summary: Intelligent reflecting surface (IRS) is a key technology for smart and reconfigurable wireless communication environments. It provides a cost-effective way to combat wireless channel impairments by controlling signal reflection in real time. However, efficient integration and practical design issues pose challenges for IRS research, requiring innovative solutions.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Yu Lin, Hui Song, Feng Ke, Weizhao Yan, Zhikai Liu, Faming Cai
Summary: The paper investigates the optimal caching scheme for D2D networks with multiple robot helpers, proposing the RHAC scheme to optimize system performance through moving robots to optimal positions. It introduces the PAPSO algorithm and mobility-aware optimization strategy for robot helpers. Results show significant performance improvements with the RHAC scheme and provide insights for introducing robot helpers into scenarios like smart factories.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Zhenglai Li, Chang Tang, Xinwang Liu, Xiao Zheng, Wei Zhang, En Zhu
Summary: This novel multi-view clustering method constructs an essential similarity graph in a spectral embedding space, addressing the issue of noise and redundancy from learning similarity graph directly from original features. By imposing a weighted tensor nuclear norm constraint, it captures high-order consistent information and effectively handles clustering of multi-view datasets.
IEEE TRANSACTIONS ON MULTIMEDIA
(2022)