A game-based deep reinforcement learning approach for energy-efficient computation in MEC systems
Many previous energy-efficient computation optimization works for mobile edge computing
(MEC) systems have been based on the assumption of synchronous offloading, where all …
(MEC) systems have been based on the assumption of synchronous offloading, where all …
Research on image retrieval algorithm based on combination of color and shape features
X Zenggang, T Zhiwen, C **aowen, Z Xue-min… - Journal of signal …, 2021 - Springer
With the development of content-based image retrieval technology, the retrieval efficiency of
image retrieval technology is getting higher and higher. For different data images, image …
image retrieval technology is getting higher and higher. For different data images, image …
A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data
W Yang, X Chen, Z **ong, Z Xu, G Liu, X Zhang - Information sciences, 2021 - Elsevier
The vehicle fuel consumption gauge is a vehicle's basic device that usually records the
instantaneous as well as average fuel consumption of the vehicle, which brings a lot of …
instantaneous as well as average fuel consumption of the vehicle, which brings a lot of …
An equivalent exchange based data forwarding incentive scheme for socially aware networks
Z **ong, N **ao, F Xu, X Zhang, Q Xu, K Zhang… - Journal of Signal …, 2021 - Springer
As nodes have limited resources in the socially aware networks, they will have strong selfish
behaviors, such as not forwarding messages and losing packets, which will lead to poor …
behaviors, such as not forwarding messages and losing packets, which will lead to poor …
A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
The rapid development of sensing, automation and communication technologies has led to
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …
A comprehensive confirmation-based selfish node detection algorithm for socially aware networks
Z **ong, X Li, X Zhang, M Deng, F Xu, B Zhou… - Journal of Signal …, 2023 - Springer
Data transmission in socially aware networks is usually accomplished through opportunistic
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …
Resource allocation robustness in multi-core embedded systems with inaccurate information
Multi-core technologies are widely used in embedded systems and the resource allocation
is vita to guarantee Quality of Service (QoS) requirements for applications on multi-core …
is vita to guarantee Quality of Service (QoS) requirements for applications on multi-core …
Joint beamforming coordination and user selection for CoMP-enabled NR-U networks
The sixth-generation (6G) era is expected to provide even higher levels of massive
connectivity/Internet of Things (IoT), tremendous data rate, and low latency than the 5G …
connectivity/Internet of Things (IoT), tremendous data rate, and low latency than the 5G …
Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability
With the increasing capabilities of mobile phones, mobile users access data via wireless
interfaces pervasively. Although WiFi has limited coverage and resulted in a bigger delay of …
interfaces pervasively. Although WiFi has limited coverage and resulted in a bigger delay of …
Energy efficient task assignment with guaranteed probability satisfying timing constraints for embedded systems
The trade-off between system performance and energy efficiency (service time) is critical for
battery-based embedded systems. Most of the previous work focuses on saving energy in a …
battery-based embedded systems. Most of the previous work focuses on saving energy in a …