Showing papers in "Computer Communications in 2022"
••
TL;DR: In this article, the authors proposed a new routing protocol with the cluster structure for IoT networks using blockchain-based architecture for SDN controller, which obviates proof-of-work (PoW) with private and public blockchains for peer-to-peer (P2P) communication between SDN controllers and IoT devices.
64 citations
••
TL;DR: In this paper , the authors proposed a new routing protocol with the cluster structure for IoT networks using blockchain-based architecture for SDN controller, which obviates proof-of-work (PoW) with private and public blockchains for peer-to-peer (P2P) communication between SDN controllers and IoT devices.
64 citations
••
TL;DR: In this paper , an improved caching scheme named robot helper aided caching (RHAC) is proposed to optimize the system performance by moving the robot helpers to the optimal positions, which can bring significant performance improvements in terms of hitting probability, cost, delay and energy consumption.
54 citations
••
TL;DR: In this article, an improved caching scheme named robot helper aided caching (RHAC) is proposed to optimize the system performance by moving the robot helpers to the optimal positions, which can bring significant performance improvements in terms of hitting probability, cost, delay and energy consumption.
54 citations
••
TL;DR: In this paper , a survey of graph-based deep learning methods for communication networks involving both wired and wireless scenarios is presented. But, the authors focus on the application of graphbased methods in wireless networks.
51 citations
••
TL;DR: Wang et al. as discussed by the authors proposed a triad-based social network evolution analysis method (SNEA), which includes a prediction algorithm that learns the evolution of the triad transition probability matrix through time series and a quantization algorithm (TTHQA) that quantifies the impact of triad transformations on the network based on random walks.
43 citations
••
TL;DR: Wang et al. as mentioned in this paper proposed a triad-based social network evolution analysis method (SNEA), which includes a prediction algorithm that learns the evolution of the triad transition probability matrix through time series and a quantization algorithm (TTHQA) that quantifies the impact of triad transformations on the network based on random walks.
41 citations
••
TL;DR: In this paper , the authors proposed a real-time surveillance helmet that incorporates IoT Sensors that can rescue with early warning intelligence on the presence of fire, silicosis dust particles, temperature, harmful gases, and others that will reduce worker health risks.
33 citations
••
TL;DR: In this paper , an effective batch authentication and key exchange technique was proposed to avoid contact with hostile vehicle users. And three types of systems were proposed: PKI, ID-based, and MAC-based.
32 citations
••
TL;DR: In this article , a hybrid whale optimization algorithm-based MBA algorithm is proposed for solving the multi-objective task scheduling problems in cloud computing environments, which decreases the makespan by maximizing the resource utilization.
25 citations
••
TL;DR: In this paper , a comprehensive study on watermarking using trending technologies, such as artificial intelligence, machine learning and deep learning, is presented, which briefly discusses the introduction of watermark, background information and the most interesting and utilized applications.
••
TL;DR: In this article , a hybrid whale optimization algorithm-based MBA algorithm is proposed for solving the multi-objective task scheduling problems in cloud computing environments, which decreases the makespan by maximizing the resource utilization.
••
TL;DR: In this paper , an anomaly detection approach by integration of intelligent deep learning technique named Convolutional Neural Network (CNN) with Kalman Filter (KF) based Gaussian-Mixture Model (GMM).
••
TL;DR: In this paper , a secure mobile edge computing (MEC) for emerging cyber physical systems (CPS), where there exist K eavesdroppers in the network, which can threaten the task offloading, is studied.
••
TL;DR: A lattice-based two-party authenticated key agreement (LB-ID-2PAKA) protocol using identity-based cryptography (IBC) is proposed, which could resist the quantum computers and IBC could remove the overhead of certificate management.
••
TL;DR: In this article , a hybrid of Decision Table and Naive Bayes models were combined to train and detect intrusions, which achieved an accuracy of 96.8% using five features of CICIDS2017, which is higher than the accuracy of methods discussed in the literatures.
••
TL;DR: In this article , a self-adjusting stratified sampling algorithm is proposed for real-time data stream processing of the Internet of Things (IoT), which adjusts the size of the sample stratums according to the variance of each stratum while maintaining the given memory budget.
••
TL;DR: In this article , the authors present an extensive and exhaustive review on the use of FL in intrusion detection system, including various types of IDS, relevant ML approaches and its associated issues.
••
TL;DR: In this paper , the authors developed Deep Convolutional Neural Network (DCNN) and Distributed Particle Filtering Evaluation Scheme (DPFES) for constructing a secure and cooperative multi-watchdog system.
••
TL;DR: In this article , a mathematical model for scheduling tasks that are being executed at low-power devices and concurrently on the cloud edge is presented, which is intended to distribute resources among devices optimally while minimizing network overhead.
••
TL;DR: In this article , a joint task and energy offloading problem is studied under a UAV-aided and energy-constrained intelligent edge network, consisting of a high altitude platform (HAP), multiple UAVs, and on-ground fog computing nodes (FCNs).
••
TL;DR: In this article , a fly-and-communicate protocol for the UAV is considered, where a UAV sweeps a large rectangular area to disperse a common file to ground nodes with obscure positions.
••
TL;DR: In this paper , the authors presented an efficient packet-based botnet detection system based on explainable machine learning and feature selection to produce a data set with only seven features to train a machine learning classifier that achieves very high accuracy.
••
TL;DR: In this article , the authors proposed an ultra-lightweight RFID security authentication protocol utilizing a cloud server named CRUSAP, which is based on Bit-Crossing XOR rearrangement operations that can effectively resist forgery attacks, replay attacks, desynchronization attacks, and denial of service attacks while certifying the cloud server.
••
TL;DR: In this paper , the authors proposed a lattice-based two-party authenticated key agreement (LB-ID-2PAKA) protocol using identity-based cryptography (IBC).
••
TL;DR: In this paper , the authors integrate Graph Neural Networks (GNN) into DRL agents and design a problem specific action space to enable generalization, which allows the proposed GNN-based DRL agent to learn and generalize over arbitrary network topologies.
••
TL;DR: New Radio flexibility (NRflex) provides a solution that dynamically assigns BWP to the running slices and their associated User Equipment (UE), aiming to fulfill the slices’ required QoS.
••
TL;DR: In this article , an IDS framework using Machine Learning (ML) techniques is implemented, which uses different types of Recurrent Neural Networks (RNNs), namely, Long Short Term Memory (LSTM), Gated Recurrent Unit (GRU), and Simple RNN.
••
TL;DR: In this paper , the authors proposed an algorithm that prioritizes the tasks regarding their execution deadline and reduce the consumed energy of the machines processing the low-priority tasks using the DVFS method.
••
TL;DR: This paper provides a thorough analysis of the influence of using the different SUMO’s traffic demand generation tools on mobility and node connectivity and proposes an automatized tool that facilitates researchers the generation of synthetic traffic based on real data.