A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions

M Ozkan-Okay, E Akin, Ö Aslan, S Kosunalp… - IEEe …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

Software-defined UAV networks for 6G systems: Requirements, opportunities, emerging techniques, challenges, and research directions

MABS Abir, MZ Chowdhury… - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
The ever-increasing demand for wireless communication has driven the development of
innovative technologies to address the issues that conventional communication networks …

Security framework for internet-of-things-based software-defined networks using blockchain

S Rani, H Babbar, G Srivastava… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Presently, trillions of Internet of Things (IoT) devices are in use, with many more projected to
join IoT networks in the future. These IoT devices create a massive volume of data, which …

A robust deep learning framework based on spectrograms for heart sound classification

J Chen, Z Guo, X Xu, L Zhang, Y Teng… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
Heart sound analysis plays an important role in early detecting heart disease. However,
manual detection requires doctors with extensive clinical experience, which increases …

Lightweight blockchain-enhanced mutual authentication protocol for UAVs

W Wang, Z Han, TR Gadekallu, S Raza… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the rapid increase of data from unmanned aerial vehicles (UAVs), the security and
privacy of data presents a severe challenge for UAV-based applications. Moreover, UAVs …

A deep neural collaborative filtering based service recommendation method with multi-source data for smart cloud-edge collaboration applications

W Lin, M Zhu, X Zhou, R Zhang, X Zhao… - Tsinghua Science …, 2023 - ieeexplore.ieee.org
Service recommendation provides an effective solution to extract valuable information from
the huge and ever-increasing volume of big data generated by the large cardinality of user …

Hedera: A permissionless and scalable hybrid blockchain consensus algorithm in multiaccess edge computing for IoT

Y Tang, J Yan, C Chakraborty… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Multiaccess edge computing (MEC) network, as one of the key infrastructures of IoT,
provides cloud computing capabilities at the edge of the radio access network (RAN) by …

A distributed game theoretical approach for credibility-guaranteed multimedia data offloading in MEC

Y Chen, J Zhao, X Zhou, L Qi, X Xu, J Huang - Information Sciences, 2023 - Elsevier
Due to the limited resources of Internet of Things (IoT) devices, the multimedia application
data generated by IoT devices can be offloaded to edge servers for processing. In this …

Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems

C Wang, T Zhou, J Shen, W Wang, X Zhou - Future Generation Computer …, 2023 - Elsevier
Driven by artificial intelligence and network communication technology, intelligent 6G
wireless systems have gradually become an important environment for users to enjoy data …

Energy consumption optimization of UAV-assisted traffic monitoring scheme with tiny reinforcement learning

X Kong, C Ni, G Duan, G Shen… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) equipped with high-definition cameras have the
capability to capture comprehensive and multiangled images of road conditions, facilitating …