Skip to main content

previous disabled Page of 117
and
  1. No Access

    Article

    An Unequal Clustering Energy Consumption Balancing Routing Algorithm of UAV Swarm Based on Ultraviolet Secret Communication

    Focusing on the tasks collaboration requirements of Unmanned Aerial Vehicle (UAV) swarm in complex battlefield environment, it is especially important to ensure the reliability of routing communication within ...

    Taifei Zhao, Minhua Cheng, **nzhe Lyu, Haijun Zhang in Wireless Personal Communications (2024)

  2. No Access

    Article

    Energy-efficiently collaborative data downloading in optical satellite networks

    Optical satellite networks (OSNs) play an important role in space applications since it has some merits such as high data rate and low power. Increasing space applications generate a large amount of data on sa...

    **anfeng Liu, **aoqian Chen, Kanglian Zhao, Lei Yang, Yong Zhao in Wireless Networks (2024)

  3. No Access

    Article

    Smart preschool education live streaming: VR-driven optimization strategy

    The construction of smart city has become the frontier trend of city development. Smart education shows the inner beauty of smart city, and smart education is the connotation extension of educational informati...

    Hong Zhao in Wireless Networks (2024)

  4. No Access

    Article

    Refactoring business process models with process fragments substitution

    Since business processes are important assets of enterprises, thousands of business processes are modeled. After modeling business process models, a problem arises here is how to improve the efficiency of thes...

    Fei Dai, Qi Mo, Tong Li, Bi Huang, Yongji Yang, Youjie Zhao in Wireless Networks (2024)

  5. No Access

    Article

    A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing

    In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed around the base stations. Generally, due to the uneven distribution and mobility of users, one ED is required to serve multip...

    Mengmeng Cui, Haochen Zhang, Yong Huang, Zhanyang Xu, Qingzhan Zhao in Wireless Networks (2024)

  6. No Access

    Article

    Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid

    Double auction provides a cost-effective manner for sellers/buyers in smart grid. Due to concerns about information leakage, the asks/bids from sellers/buyers are sealed, making it challenging to select potent...

    Kai Zhang, Ludan Lu, Jian Zhao, Lifei Wei in Peer-to-Peer Networking and Applications (2024)

  7. No Access

    Article

    Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids

    As a classic cyber-physical system, smart grids often suffer from various types of attacks, one of which the most threatening attacks is coordinated cyber-physical attack (CCPA). In order to improve the robust...

    Wenjie Kang, Qiang Liu, Peidong Zhu, Wei Zhao, Xuchong Liu, Gang Hu in Wireless Networks (2024)

  8. No Access

    Article

    A privacy protection scheme for green communication combining digital steganography

    In order to ensure the sustainable development of the Internet of Things (IoT), researchers have been exploring and making technological innovations in the fields of smart grid as well as green communication a...

    Pengbiao Zhao, Bintao Wang, Zhen Qin, Yi Ding in Peer-to-Peer Networking and Applications (2024)

  9. No Access

    Article

    Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption

    While it is well known that privacy-preserving cox regression generally consists of a semi-honest cloud service provider (CSP) who performs curious-but-honest computations on ciphertexts to train the cox model...

    Wenju Xu, **n Li, Yunxuan Su, Baocang Wang in Peer-to-Peer Networking and Applications (2024)

  10. No Access

    Article

    Byzantine detection for federated learning under highly non-IID data and majority corruptions

    Federated Learning (FL) is a privacy-preserving paradigm which enables multiple clients to jointly learn a model and keeps their data local. However, the nature of FL leaves the vulnerability to Byzantine attacks

    Zhonglin Wang, ** Zhao in Wireless Networks (2024)

  11. No Access

    Article

    Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine

    The progress of machine learning has revealed its immense potential in emerging medical diagnosis application. This application enables medical users to access diagnosis service that utilizes machine learning ...

    Runze Wu, Baocang Wang, Zhen Zhao in Peer-to-Peer Networking and Applications (2024)

  12. No Access

    Article

    Intelligent reflecting surface aided secure MIMO wireless communication

    Intelligent reflecting surface (IRS) holds tremendous potential as an efficient solution for achieving a dynamically reconfigurable wireless communication environment in a cost-efficient manner. This work expl...

    Hongyuan Gao, Lishuai Zhao, Lantu Guo, Yanan Du, Yanqi Di in Wireless Networks (2024)

  13. No Access

    Article

    EALSO: joint energy-aware and latency-sensitive task offloading for artificial Intelligence of Things in vehicular fog computing

    Artificial Intelligence of Things (AIoT) is an emerging field within the Internet of Things (IoT) that caters to the growing demand for intelligent computing and communications. Vehicular fog computing (VFC) w...

    Chenyi Liang, Yifeng Zhao, Zhibin Gao, Keyi Cheng, Bo Wang in Wireless Networks (2024)

  14. No Access

    Article

    An Entorhinal-Hippocampal Loop Model Based on Non-negative Sparse Coding

    In our study, we investigate how the brain maps environmental spaces into understandable maps through hippocampal place cells and entorhinal cortex grid cells. We uncover that the hippocampus and entorhinal co...

    Kaixin Zhao, Menghui Ren in Journal of The Institution of Engineers (India): Series B (2024)

  15. No Access

    Article

    A blockchain-based auditable deduplication scheme for multi-cloud storage

    Cloud storage has attracted widespread attention due to its advantages such as convenience, low cost, and easy scalability. With the explosion of cloud data volumes, security and performance issues are becomin...

    Chunhua **, Yongliang Xu, Wenyu Qin, Jie Zhao in Peer-to-Peer Networking and Applications (2024)

  16. No Access

    Article

    An INS/UWB joint indoor positioning algorithm based on hypothesis testing and yaw angle

    Wireless sensor network (WSN) is widely used in indoor positioning, but indoor positioning is susceptible to non-line-of-sight (NLOS) propagation environment. The inertial navigation system (INS) does not depe...

    Long Cheng, Fuyang Zhao, Wenhao Zhao in Wireless Networks (2024)

  17. No Access

    Article

    Research on Moving Liquid Level Detection Method of Viscometer in Dynamic Scene

    In order to solve the problem of false detection of the moving liquid level caused by the vibration of the constant temperature water bath, this paper combines the Type-2 Fuzzy Gaussian Mixture Model (T2-FGMM)...

    Liu **a, **g Rongyao, Zhang Kun, Zhao Qinjun in Mobile Networks and Applications (2024)

  18. No Access

    Article

    Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks

    The security of wireless access is studied for the integrated wireless communications and sensing in 6G Internet of Everything networks. The scaling law of the secured communications and that of the secured se...

    Juan Zhao, Haibo Dai, **aolong Xu, Hao Yan, Zheng Zhang in Wireless Networks (2024)

  19. Article

    Open Access

    Retraction Note: Application of deep learning in Mandarin Chinese lip-reading recognition

    Guangxin **ng, Lingkun Han, Yelong Zheng in EURASIP Journal on Wireless Communications… (2024)

  20. Article

    Open Access

    Retraction Note: Optimized design and application research of smart interactive screen for wireless networks based on federated learning

    Chang Zhao, Linghao Zhang in EURASIP Journal on Wireless Communications and Networking (2024)

previous disabled Page of 117