Search

Showing total 99 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Publication Year Range This year Remove constraint Publication Year Range: This year Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Journal iet communications (wiley-blackwell) Remove constraint Journal: iet communications (wiley-blackwell)
99 results

Search Results

1. Segmentation‐enhanced gamma spectrum denoising based on deep learning.

2. Low‐complexity channel estimation for V2X systems using feed‐forward neural networks.

3. Clustered DTN routing based on sensing node relationship strength.

4. On a class of column‐weight 3 decomposable LDPC codes with the analysis of elementary trapping sets.

5. Survey of research on confidential computing.

6. Distributed MA‐IDDPG‐OLSR based stable routing protocol for unmanned aerial vehicle ad‐hoc network.

7. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

8. SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract.

9. Joint optimization of sampling point and sensing threshold for spectrum sensing.

10. Bat algorithm based semi‐distributed resource allocation in ultra‐dense networks.

11. KDGAN: Knowledge distillation‐based model copyright protection for secure and communication‐efficient model publishing.

12. Joint optimization of deployment, user association, channel, and resource allocation for fairness‐aware multi‐UAV network.

13. Sum‐rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters.

14. Multi‐view synergistic enhanced fault recording data for transmission line fault classification.

15. Optimizing secure power allocation in massive MIMO systems with an eavesdropper under imperfect CSI conditions.

16. Resource allocation and passive beamforming for IRS‐assisted short packet systems.

17. Privacy‐preserving data integration scheme in industrial robot system based on fog computing and edge computing.

18. Two‐step attribute reduction for AIoT networks.

19. A novel federated learning aggregation algorithm for AIoT intrusion detection.

20. Improved reputation evaluation for reliable federated learning on blockchain.

21. A joint resource optimization allocation algorithm for NOMA‐D2D communication.

22. Analysis one‐bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning.

23. FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection.

24. Data transmission path planning method for wireless sensor network in grounding grid area based on MM‐DPS hybrid algorithm.

25. Robust beamforming design for passive RIS‐assisted NOMA systems.

26. Intelligent reflecting surface‐assisted UAV inspection system based on transfer learning.

27. Error analysis for face coded modulation system.

28. Chunk2vec: A novel resemblance detection scheme based on Sentence‐BERT for post‐deduplication delta compression in network transmission.

29. Whale optimization‐based PTS scheme for PAPR reduction in UFMC systems.

30. Research on weighted energy consumption and delay optimization algorithm based on dual‐queue model.

31. Electromagnetic field exposure boundary analysis at the near field for multi‐technology cellular base station site.

32. Machine learning assisted adaptive LDPC coded system design and analysis.

33. CSVRF: A CAM‐based popularity‐aware egress group‐caching scheme for SVRF‐based packet forward engines.

34. Wireless sensor network security defense strategy based on Bayesian reputation evaluation model.

35. Knowledge graph reasoning for cyber attack detection.

36. PageRank talent mining algorithm of power system based on cognitive load and DPCNN.

37. Toward designing a lightweight RFID authentication protocol for constrained environments.

38. A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models.

39. Reliable communication based on energy spreading transform and iterative detection in MIMO‐OFDM systems.

40. A comparative analysis of two‐stage approaches for embedding network function virtualization enabled multicast services.

41. Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning.

42. A chaotic time series combined prediction model for improving trend lagging.

43. Secondary cluster head based SEP in heterogeneous WSNs for IoT applications.

44. A composite spread spectrum sequence for underwater acoustic signal acquisition.

45. Channel estimation for backscatter communication systems with retrodirective arrays.

46. Doppler spread analysis for suppressing channel time variation in high‐mobility massive MIMO V2V communications.

47. A blockchain‐based secure framework for data management.

48. A back‐to‐back coordination‐based learning scheme for deceiving reactive jammers in distributed networks.

49. Energy efficient RF chains selection based on integrated Hungarian and genetic approaches for uplink cell‐free millimetre‐wave massive MIMO systems.

50. An effective attention and residual network for malware detection.