L Li, Y Xu, J Yin, W Liang, X Li… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) technology suffers from the challenge that rare wireless network resources are difficult to meet the influx of a huge number of terminal devices. Cache …
YH Xu, CC Yang, M Hua, W Zhou - IEEE Access, 2020 - ieeexplore.ieee.org
This paper investigates the resource allocation problem in vehicular communications based on multi-agent Deep Deterministic Policy Gradient (DDPG), in which each Vehicle-to …
T Wang, H Luo, X Zheng, M Xie - ACM Transactions on Intelligent …, 2019 - dl.acm.org
Both academia and industry have directed tremendous interest toward the combination of Cyber Physical Systems and Cloud Computing, which enables a new breed of applications …
T Wang, L Qiu, AK Sangaiah, G Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The tremendous growth of interconnected things/devices in the whole world advances to the new paradigm, ie, Internet of Things (IoT). The IoT use sensor-based embedded systems to …
T Wang, Y Liang, W Jia, M Arif, A Liu, M Xie - Journal of Network and …, 2019 - Elsevier
The smart city is set to be the next important stage in human history. It consists of numerous Cyber-physical systems (CPS) that can be endowed with different levels of intelligence …
H Hellaoui, M Koudil… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming generation of mobile networks, 5G …
Driverless parking, an influential application of Mobility as a Service (MaaS) model, is one of the clear early benefits for autonomous vehicles, given often narrow spaces and multiple …
Z Liu, X Han, Y Liu, Y Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communications can combine the superiorities of both the cellular network and the Ad hoc network, and it is an efficient way to improve the capacity of short …
TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …