Edge computing and sensor-cloud: Overview, solutions, and directions

T Wang, Y Liang, X Shen, X Zheng, A Mahmood… - ACM Computing …, 2023 - dl.acm.org
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …

Behavioral modeling and linearization of wideband RF power amplifiers using BiLSTM networks for 5G wireless systems

J Sun, W Shi, Z Yang, J Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Characterization and linearization of RF power amplifiers (PAs) are key issues of fifth-
generation wireless communication systems, especially when high peak-to-average ratio …

A reliable energy efficient dynamic spectrum sensing for cognitive radio IoT networks

JA Ansere, G Han, H Wang, C Choi… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) that allows connectivity of network devices embedded with
sensors undergoes severe data exchange interference as the unlicensed spectrum band …

A distributed mobile fog computing scheme for mobile delay-sensitive applications in SDN-enabled vehicular networks

C Lin, G Han, X Qi, M Guizani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the rapid development of intelligent transportation systems, enormous amounts of delay-
sensitive vehicular services have been emerging and challenge both the architectures and …

Trust management with fault-tolerant supervised routing for smart cities using internet of things

K Haseeb, T Saba, A Rehman, Z Ahmed… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) connects heterogeneous sensors with dynamic networks to
monitor smart communication and collect real-time data. Such systems are well adapted to …

Velocity-free localization of autonomous driverless vehicles in underground intelligent mines

L Dong, D Sun, G Han, X Li, Q Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The rapid progress of science and technology has created favorable conditions for the
development of autonomous driverless vehicles. However, the complex conditions in the …

A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT

G Han, H Wang, X Miao, L Liu, J Jiang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Among several new technologies, such as social and cognitive mobile computing, wireless
sensor networks (WSNs) constitute the founding pillar of the industrial Internet of Things …

AUV-aided data importance based scheme for protecting location privacy in smart ocean

G Han, Y Chen, H Wang, Y He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data collection in underwater acoustic sensor networks (UASNs) and the exposure of node
location information pose a threat to the security of the entire network. Therefore, the main …

Admission control policy and key agreement based on anonymous identity in cloud computing

D Paulraj, S Neelakandan, M Prakash… - Journal of Cloud …, 2023 - Springer
Cloud computing has completely revolutionized the concept of computing by providing users
with always-accessible resources. In terms of computational, storage, bandwidth, and …

A novel epidemic model for wireless rechargeable sensor network security

G Liu, B Peng, X Zhong - Sensors, 2020 - mdpi.com
With the development of wireless rechargeable sensor networks (WRSNs), security issues of
WRSNs have attracted more attention from scholars around the world. In this paper, a novel …