Recent advances in consensus protocols for blockchain: a survey

S Wan, M Li, G Liu, C Wang - Wireless networks, 2020 - Springer
As the core of a blockchain system, the consensus mechanism not only helps to maintain the
consistency of node data, but also gets involved in the issuance of tokens and prevention of …

Deep reinforcement learning approaches for content caching in cache-enabled D2D networks

L Li, Y Xu, J Yin, W Liang, X Li… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) technology suffers from the challenge that rare wireless network
resources are difficult to meet the influx of a huge number of terminal devices. Cache …

Deep deterministic policy gradient (DDPG)-based resource allocation scheme for NOMA vehicular communications

YH Xu, CC Yang, M Hua, W Zhou - IEEE Access, 2020 - ieeexplore.ieee.org
This paper investigates the resource allocation problem in vehicular communications based
on multi-agent Deep Deterministic Policy Gradient (DDPG), in which each Vehicle-to …

Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing

T Wang, H Luo, X Zheng, M Xie - ACM Transactions on Intelligent …, 2019 - dl.acm.org
Both academia and industry have directed tremendous interest toward the combination of
Cyber Physical Systems and Cloud Computing, which enables a new breed of applications …

Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things

T Wang, L Qiu, AK Sangaiah, G Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The tremendous growth of interconnected things/devices in the whole world advances to the
new paradigm, ie, Internet of Things (IoT). The IoT use sensor-based embedded systems to …

Coupling resource management based on fog computing in smart city systems

T Wang, Y Liang, W Jia, M Arif, A Liu, M Xie - Journal of Network and …, 2019 - Elsevier
The smart city is set to be the next important stage in human history. It consists of numerous
Cyber-physical systems (CPS) that can be endowed with different levels of intelligence …

Energy efficiency in security of 5G-based IoT: An end-to-end adaptive approach

H Hellaoui, M Koudil… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The challenging problem of energy efficiency in security of the Internet of Things (IoT) is
tackled in this article. The authors consider the upcoming generation of mobile networks, 5G …

Privacy-aware autonomous valet parking: Towards experience driven approach

SR Pokhrel, Y Qu, S Nepal… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Driverless parking, an influential application of Mobility as a Service (MaaS) model, is one of
the clear early benefits for autonomous vehicles, given often narrow spaces and multiple …

D2D-based vehicular communication with delayed CSI feedback

Z Liu, X Han, Y Liu, Y Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communications can combine the superiorities of both the cellular
network and the Ad hoc network, and it is an efficient way to improve the capacity of short …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …