Physical-layer security based mobile edge computing for emerging cyber physical systems

L Chen, S Tang, V Balasubramanian, J Xia… - Computer …, 2022 - Elsevier
This paper studies a secure mobile edge computing (MEC) for emerging cyber physical
systems (CPS), where there exist K eavesdroppers in the network, which can threaten the …

Task offloading for vehicular edge computing with imperfect CSI: A deep reinforcement approach

Y Wu, J Xia, C Gao, J Ou, C Fan, J Ou, D Fan - Physical Communication, 2022 - Elsevier
This article examines a multi-user mobile edge computing (MEC) system for the Internet of
Vehicle (IoV), where one edge point (EP) nearby the vehicles can help assist in processing …

Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security

L Zhang, S Lai, J Xia, C Gao, D Fan, J Ou - Physical Communication, 2022 - Elsevier
In this paper, we investigate an intelligent reflecting surface (IRS)-assisted mobile edge
computing (MEC) network under physical-layer security, where users can partially offload …

Analysis and design of standard knowledge service system based on deep learning

Y Zhou, Z Lin, L Tu, J Huang, Z Zhang - EAI Endorsed Transactions on …, 2022 - eudl.eu
The development of information technology has changed the mode of communication of
social information, and this change has put forward new requirements on the contents …

Threshold-enhanced hierarchical spatial non-stationary channel estimation for uplink massive mimo systems

C Tan, D Cai, Y Xu, Z Ding, P Fan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Spatial non-stationarity channel estimation for uplink massive MIMO systems can be
formulated as a non-uniform block sparse signal recovery problem, in which the hierarchical …

A strong physical unclonable function with machine learning immunity for Internet of Things application

P Ren, Y Xue, L Jing, L Zhang, R Wang, Z Ji - Science China Information …, 2024 - Springer
The physical unclonable functions (PUFs) are novel cryptographic primitives in modern
hardware security systems. Compared with traditional alternatives based on digital keys and …

Analysis and design of power system transformer standard based on knowledge graph

Y Zhou, Z Lin, Y La, J Huang, X Wang - EAI Endorsed Transactions on …, 2022 - eudl.eu
The transformer can convert one kind of electric energy such as AC current and AC voltage
into another kind of electric energy with the same frequency. Knowledge graph (KG) can …

Data-Driven Low-complexity Detection in Grant-Free NOMA for IoT

MB Shahab, SJ Johnson… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
This paper proposes a low-complexity data-driven multi-user detector for grant-free non-
orthogonal multiple access (GF-NOMA), which has gained significant interest in Internet of …

Performance analysis of ABCom NOMA systems for 6G with generalized hardware impairments

D Cui, G Huang, Y Zheng, H Guo, J Li, X Li - Physical Communication, 2022 - Elsevier
With the continuous emergence of new smart applications, the number of smart devices is
increasing exponentially. Therefore, it is a great challenge to meet the rising network …

Research on knowledge management of novel power system based on deep learning

Z Lin, J Lin - EAI Endorsed Transactions on Scalable Information …, 2023 - publications.eai.eu
With the rapid development of information technology, power system has been developed
and applied rapidly. In the power system, fault detection is very important and is one of the …