A distributed framework for energy trading between UAVs and charging stations for critical applications

V Hassija, V Chamola, DNG Krishna… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Use of Unmanned Aerial Vehicles (UAVs) is rapidly increasing in various domains such as
disaster management, delivery of goods, surveillance, military, etc. Significant issues in the …

Computing paradigms in emerging vehicular environments: A review

L Silva, N Magaia, B Sousa… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
Determining how to structure vehicular network environments can be done in various ways.
Here, we highlight vehicle networks' evolution from vehicular ad-hoc networks (VANET) to …

Caching placement and resource allocation for cache-enabling UAV NOMA networks

T Zhang, Z Wang, Y Liu, W Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article investigates the cache-enabling unmanned aerial vehicle (UAV) cellular
networks with massive access capability supported by non-orthogonal multiple access …

Transfer learning for semi-supervised automatic modulation classification in ZF-MIMO systems

Y Wang, G Gui, H Gacanin, T Ohtsuki… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Automatic modulation classification (AMC) is an essential technology for the non-
cooperative communication systems, and it is widely applied into various communications …

Multiagent deep-reinforcement-learning-based resource allocation for heterogeneous QoS guarantees for vehicular networks

J Tian, Q Liu, H Zhang, D Wu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Vehicle-to-vehicle communications can offer direct information interaction, including security-
centered information and entertainment information. However, the rapid proliferation of …

Malware traffic classification using domain adaptation and ladder network for secure industrial internet of things

J Ning, G Gui, Y Wang, J Yang… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Malware traffic classification (MTC) is a key technology for anomaly and intrusion detection
in secure Industrial Internet of Things (IIoT). Traditional MTC methods based on port …

Downlink CSI feedback algorithm with deep transfer learning for FDD massive MIMO systems

J Zeng, J Sun, G Gui, B Adebisi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, a channel state information (CSI) feedback method is proposed based on deep
transfer learning (DTL). The proposed method addresses the problem of high training cost of …

A perspective on 6G: Requirement, technology, enablers, challenges and future road map

PP Ray - Journal of Systems Architecture, 2021 - Elsevier
Mobile network operators are at the verge of distribution and allotment of existing mobile
communications with 5G. It is a high time that we should be focused on the forthcoming sixth …

[HTML][HTML] Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions

SM Karim, A Habbal, SA Chaudhry… - Security and …, 2022 - hindawi.com
Internet of Vehicles (IoV) is a multinode network that exchanges information in an open,
wireless environment. Various communication activities exist between IoV entities to share …

Deep-learning-based intelligent intervehicle distance control for 6G-enabled cooperative autonomous driving

X Chen, S Leng, J He, L Zhou - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Research on the sixth-generation cellular networks (6G) is gaining huge momentum to
achieve ubiquitous wireless connectivity. Connected autonomous vehicles (CAVs) is a …