A survey on federated learning for security and privacy in healthcare applications
Technological advances in smart devices and applications targeting the Internet of Healthcare Things provide a perfect environment for using Machine Learning-based techniques. However, traditional ML solutions operate on centralized ...
Secure, accurate and privacy-aware fully decentralized learning via co-utility
Fully decentralized learning is a setting in which each peer in a P2P network trains a machine learning model with the help of the other peers. Each peer acts as a model manager by periodically sending her current model to other peers, ...
Agile: A high-scalable and low-jitter flow tables lifecycle management framework for multi-core programmable data plane
In software-defined networking (SDN), the common flow table updates have constrained its performance. The current southbound protocol determines neither the priority nor the method of flow table update, which could result in latency-...
Intelligent routing algorithm for wireless sensor networks dynamically guided by distributed neural networks
Using reinforcement learning to adjust the power balance of sensor nodes dynamically is an essential approach for extending the lifetime of wireless sensor networks (WSNs), which makes sensor nodes adapt to changing environments by ...
Accurate compressed traffic detection via traffic analysis using Graph Convolutional Network based on graph structure feature
As the application of data compression technology expands in areas such as IoT, webpage, and video data transmission, there are problems such as leakage of compressed but unencrypted user data, difficulty in supervising compressed data,...
Data Placement and Transmission Scheduling for coded multicast in mobile edge networks
Edge caching is a promising strategy to reduce the traffic load in mobile core networks, by caching popular contents at the edge of mobile networks, e.g., base stations (BSs). For the BSs to transmit data to user equipment (UEs), coded ...
A crowd cooperative defense model for mitigating DDoS attacks in Mobile Crowdsensing networks
Mobile Crowdsensing (MCS) is rapidly growing up while encountering severe security threats simultaneously. DDoS attacks tend to disrupt large-scale sensing tasks to the MCS and reduce the availability of MCS. However, the existing ...
Construction of FANETs for user coverage and information transmission in disaster rescue scenarios
In this paper, we consider a flying ad hoc network (FANET) construction problem in a post-disaster scenario where ground users (GUs) lose contact with the outside world. The main objective of the FANET is to provide communication ...
SANet: A novel segmented attention mechanism and multi-level information fusion network for 6D object pose estimation
Reliably and rapidly estimating the 6D position of an object is a critical challenge when using Internet of Things (IoT) technologies for monitoring. Nowadays, the prevalent 6D pose estimation architecture is based on a two-stage ...
A security-friendly privacy-preserving solution for federated learning
Federated learning is a privacy-aware collaborative machine learning method where the clients collaborate on constructing a global model by performing local model training using their training data and sending the local model updates ...
A game theory-based COVID-19 close contact detecting method with edge computing collaboration
People all throughout the world have suffered from the COVID-19 pandemic. People can be infected after brief contact, so how to assess the risk of infection for everyone effectively is a tricky challenge. In view of this challenge, the ...
AI-based energy-efficient path planning of multiple logistics UAVs in intelligent transportation systems
In the context of Industry 5.0, artificial intelligence (AI)-based logistics Unmanned Aerial Vehicles (UAVs) have been widely applied in intelligent transportation systems due to their advantages of faster speed, lower cost, more ...
Efficient consensus algorithm based on improved DPoS in UAV-assisted mobile edge computing
Aiming at the problems of low decentralization, low motivation for node voting, and malicious behavior of nodes for the traditional DPoS consensus mechanism in the blockchain-based UAV-assisted mobile edge computing environment, this ...
f 2-ToF: A feature-alignment and frequency-division time-of-flight data denoise network
Infrared wave time-of-flight (ToF) imaging is a important method to sense the 3D information of scene for Internet of Things (IoT) and artificial intelligent (AI). Driven by heavy demands from industry and users, ToF imaging has ...
Highlights
- A feature-alignment frequency-division CNN mitigates multinoises of ToF data.
- ...
Circular Time Shift Modulation for robust underwater acoustic communications in doubly spread channels
Pulse Position Modulation (PPM) has shown great advantages by being non-coherently implementable. However, PPM suffers from the high multipath delay in underwater acoustic channels. To be robust against the doubly spread effects in ...