Interference management in 5G and beyond network: Requirements, challenges and future directions

MUA Siddiqui, F Qamar, F Ahmed, QN Nguyen… - IEEE …, 2021 - ieeexplore.ieee.org
In the modern technological world, wireless communication has taken a massive leap from
the conventional communication system to a new radio communication network. The novel …

Cloud-edge orchestration for the Internet of Things: Architecture and AI-powered data processing

Y Wu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has been deeply penetrated into a wide range of important and
critical sectors, including smart city, water, transportation, manufacturing, and smart factory …

Composite and efficient DDoS attack detection framework for B5G networks

GC Amaizu, CI Nwakanma, S Bhardwaj, JM Lee… - Computer Networks, 2021 - Elsevier
Distributed denial-of-service (DDoS) remains an ever-growing problem that has affected and
continues to affect a host of web applications, corporate bodies, and governments. With the …

Federated learning with non-iid data in wireless networks

Z Zhao, C Feng, W Hong, J Jiang, C Jia… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Federated learning provides a promising paradigm to enable network edge intelligence in
the future sixth generation (6G) systems. However, due to the high dynamics of wireless …

Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things

J Akram, M Umair, RH Jhaveri, MN Riaz, H Chi… - Computers and …, 2023 - Elsevier
We leverage blockchain technology for malicious node detection in Internet of Drone Things
(IoDTs). IoDTs additionally provide a secure mechanism of service delivery based on …

Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks

Z Abubaker, N Javaid, A Almogren, M Akbar, M Zuair… - Computer Networks, 2022 - Elsevier
In this paper, a blockchained Beyond Fifth Generation (B5G) enabled malicious node
detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure …

AI-driven resource management strategies for cloud computing systems, services, and applications

S Kanungo - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
Cloud computing is a way for businesses and individuals to It has changed and
revolutionized the way we access and use resources. However, efficient resource …

Mixed-timescale caching and beamforming in content recommendation aware fog-RAN: A latency perspective

X Yang, Y Fu, W Wen, TQS Quek… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Content caching is recognized as a promising solution to release the heavy burden of
backhaul links and decrease the content transmission latency in Fog radio access networks …

Auction-promoted trading for multiple federated learning services in UAV-aided networks

Z Cheng, M Liwang, X Xia, M Min… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Federated learning (FL) represents a promising distributed machine learning paradigm that
allows smart devices to collaboratively train a shared model via providing local data sets …

Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach

MSA Shuvo, MAR Munna, S Sarker, T Adhikary… - Journal of Network and …, 2021 - Elsevier
Scheduling of small cells in Fifth-Generation (5G) mobile network is highly important for
achieving energy-efficiency and providing Quality of Service (QoS) to the applications users …