Balancing QoS and Security in the Edge: Existing Practices, Challenges, and 6G Opportunities With Machine Learning
暂无分享,去创建一个
[1] Ashok Kumar Turuk,et al. Autonomous Vehicles: Resource Allocation, Security, and Data Privacy , 2022, IEEE Transactions on Green Communications and Networking.
[2] Biplab Sikdar,et al. Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey , 2022, IEEE Internet of Things Journal.
[3] Nei Kato,et al. HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks , 2022, IEEE Transactions on Emerging Topics in Computing.
[4] Z. Fadlullah,et al. Joint Provisioning of QoS and Security in IoD Networks: Classical Optimization Meets AI , 2021, IEEE Internet of Things Magazine.
[5] M. Debbah,et al. Spectrum-Learning-Aided Reconfigurable Intelligent Surfaces for “Green” 6G Networks , 2021, IEEE Network.
[6] Nei Kato,et al. On Smart IoT Remote Sensing over Integrated Terrestrial-Aerial-Space Networks: An Asynchronous Federated Learning Approach , 2021, IEEE Network.
[7] Ren-Hung Hwang,et al. Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges , 2021, IEEE Communications Surveys & Tutorials.
[8] H. Vincent Poor,et al. 6G Internet of Things: A Comprehensive Survey , 2021, IEEE Internet of Things Journal.
[9] E. Sasikala,et al. Learning based Latency Minimization Techniques in Mobile Edge Computing (MEC) systems: A Comprehensive Survey , 2021, 2021 International Conference on System, Computation, Automation and Networking (ICSCAN).
[10] Nei Kato,et al. Optimizing Computation Offloading in Satellite-UAV-Served 6G IoT: A Deep Learning Approach , 2021, IEEE Network.
[11] H. Vincent Poor,et al. Blockchain and 6G: The Future of Secure and Ubiquitous Communication , 2021, IEEE Wireless Communications.
[12] Ramon Canal,et al. A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks , 2021, IEEE Communications Surveys & Tutorials.
[13] Sanjeev Gurugopinath,et al. A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G , 2021, 2021 28th International Conference on Telecommunications (ICT).
[14] Chunguo Li,et al. Several Key Technologies for 6G: Challenges and Opportunities , 2021, IEEE Communications Standards Magazine.
[15] Weihai Zhang,et al. Indefinite Mean-Field Stochastic Cooperative Linear-Quadratic Dynamic Difference Game With Its Application to the Network Security Model , 2021, IEEE Transactions on Cybernetics.
[16] Zibin Zheng,et al. Deep Reinforcement Learning for Internet of Things: A Comprehensive Survey , 2021, IEEE Communications Surveys & Tutorials.
[17] Samir Saoudi,et al. On the Role of Stochastic Geometry in Sixth Generation Wireless Networks , 2021, 2020 10th International Symposium on Signal, Image, Video and Communications (ISIVC).
[18] Jorge Navarro-Ortiz,et al. Performance Modeling of Softwarized Network Services Based on Queuing Theory With Experimental Validation , 2021, IEEE Transactions on Mobile Computing.
[19] Neeraj Kumar,et al. Blockchain-Envisioned UAV Communication Using 6G Networks: Open Issues, Use Cases, and Future Directions , 2021, IEEE Internet of Things Journal.
[20] Ying-Chang Liang,et al. Blockchain and Artificial Intelligence for Dynamic Resource Sharing in 6G and Beyond , 2021, IEEE Wireless Communications.
[21] Victor C. M. Leung,et al. Enabling Massive IoT Toward 6G: A Comprehensive Survey , 2021, IEEE Internet of Things Journal.
[22] M. Conti,et al. A Survey on Industrial Control System Testbeds and Datasets for Security Research , 2021, IEEE Communications Surveys & Tutorials.
[23] H. Poor,et al. Context-Aware Security for 6G Wireless The Role of Physical Layer Security , 2021, ArXiv.
[24] Mostafa Rahimi Azghadi,et al. Internet of Underwater Things and Big Marine Data Analytics—A Comprehensive Survey , 2020, IEEE Communications Surveys & Tutorials.
[25] Salama Ikki,et al. Centralized Versus Heuristic-Based Distributed Channel Allocation to Minimize Packet Transmission Delay for Multiband Relay Networks , 2020, IEEE Networking Letters.
[26] Chunxiao Jiang,et al. Machine Learning for 6G Wireless Networks: Carrying Forward Enhanced Bandwidth, Massive Access, and Ultrareliable/Low-Latency Service , 2020, IEEE Vehicular Technology Magazine.
[27] Arsenia Chorti,et al. Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless , 2020, ArXiv.
[28] Ekram Hossain,et al. Single and Multi-Agent Deep Reinforcement Learning for AI-Enabled Wireless Networks: A Tutorial , 2020, IEEE Communications Surveys & Tutorials.
[29] Xiqi Gao,et al. 6G Wireless Channel Measurements and Models: Trends and Challenges , 2020, IEEE Vehicular Technology Magazine.
[30] Yue Tian,et al. MANE: Model-Agnostic Non-linear Explanations for Deep Learning Model , 2020, 2020 IEEE World Congress on Services (SERVICES).
[31] Katya Scheinberg,et al. Adaptive Stochastic Optimization: A Framework for Analyzing Stochastic Optimization Algorithms , 2020, IEEE Signal Processing Magazine.
[32] Pedro Miguel S'anchez S'anchez,et al. A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets , 2020, IEEE Communications Surveys & Tutorials.
[33] Ingrid Chieh Yu,et al. EXPLAN: Explaining Black-box Classifiers using Adaptive Neighborhood Generation , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).
[34] Scott Ruoti,et al. SenCAPTCHA , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[35] Stefan Köpsell,et al. Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation , 2020, EURASIP Journal on Wireless Communications and Networking.
[36] Kang An,et al. Secure Communications Over Cell-Free Massive MIMO Networks With Hardware Impairments , 2020, IEEE Systems Journal.
[37] Hassan N. Noura,et al. Security analysis of drones systems: Attacks, limitations, and recommendations , 2020, Internet of Things.
[38] Qinping Zhao,et al. Contextualized CNN for Scene-Aware Depth Estimation From Single RGB Image , 2020, IEEE Transactions on Multimedia.
[39] Xiaojing Huang,et al. White Paper on Broadband Connectivity in 6G , 2020, 2004.14247.
[40] Shahin Shahrampour,et al. On Distributed Nonconvex Optimization: Projected Subgradient Method for Weakly Convex Problems in Networks , 2020, IEEE Transactions on Automatic Control.
[41] Alagan Anpalagan,et al. Dynamic Power–Latency Tradeoff for Mobile Edge Computation Offloading in NOMA-Based Networks , 2020, IEEE Internet of Things Journal.
[42] Nei Kato,et al. AI-Based Joint Optimization of QoS and Security for 6G Energy Harvesting Internet of Things , 2020, IEEE Internet of Things Journal.
[43] Dinh C. Nguyen,et al. Enabling AI in Future Wireless Networks: A Data Life Cycle Perspective , 2020, IEEE Communications Surveys & Tutorials.
[44] Jun Zhang,et al. Communication-Efficient Edge AI: Algorithms and Systems , 2020, IEEE Communications Surveys & Tutorials.
[45] Yequn Wang,et al. On Delay-Aware Resource Control With Statistical QoS Provisioning By Dual Connectivity in Heterogeneous Aeronautical Network , 2020, IEEE Transactions on Vehicular Technology.
[46] Wei Wu,et al. Distributed Queueing-Based Random Access Protocol for LoRa Networks , 2020, IEEE Internet of Things Journal.
[47] Joao Xavier,et al. Primal–Dual Methods for Large-Scale and Distributed Convex Optimization and Data Analytics , 2019, Proceedings of the IEEE.
[48] Xiao Lu,et al. Toward Smart Wireless Communications via Intelligent Reflecting Surfaces: A Contemporary Survey , 2019, IEEE Communications Surveys & Tutorials.
[49] Jun Wu,et al. A Survey on Green 6G Network: Architecture and Technologies , 2019, IEEE Access.
[50] Gaurav Choudhary,et al. 5G wireless P2MP backhaul security protocol: an adaptive approach , 2019, EURASIP J. Wirel. Commun. Netw..
[51] Xiangpeng Xie,et al. Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
[52] Biplab Sikdar,et al. Data Provenance for IoT With Light Weight Authentication and Privacy Preservation , 2019, IEEE Internet of Things Journal.
[53] Ali Kashif Bashir,et al. A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario , 2019, IEEE Transactions on Industrial Informatics.
[54] Xiangdong Jia,et al. Interference Graph-Based Resource Management for Vehicular Communications , 2019, 2019 International Conference on Electronic Engineering and Informatics (EEI).
[55] Bartlomiej Blaszczyszyn,et al. Performance Analysis of Cellular Networks With Opportunistic Scheduling Using Queueing Theory and Stochastic Geometry , 2019, IEEE Transactions on Wireless Communications.
[56] Choong Seon Hong,et al. Infotainment Enabled Smart Cars: A Joint Communication, Caching, and Computation Approach , 2019, IEEE Transactions on Vehicular Technology.
[57] Yue Tan,et al. Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges , 2019, IEEE Communications Surveys & Tutorials.
[58] Syed Ali Hassan,et al. Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges , 2019, IEEE Communications Surveys & Tutorials.
[59] Xiaofei Wang,et al. Convergence of Edge Computing and Deep Learning: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[60] Gerhard Bauch,et al. Prioritized Multistream Traffic in Uplink IoT Networks: Spatially Interacting Vacation Queues , 2019, IEEE Internet of Things Journal.
[61] P. Fan,et al. 6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies , 2019, IEEE Vehicular Technology Magazine.
[62] Kato Nei,et al. Physical Layer Security in Large–Scale Probabilistic Caching: Analysis and Optimization , 2019, IEEE Communications Letters.
[63] Bo Zhao,et al. A survey: Typical security issues of software-defined networking , 2019, China Communications.
[64] Geoffrey Ye Li,et al. Resource Allocation for Vehicular Communications With Low Latency and High Reliability , 2019, IEEE Transactions on Wireless Communications.
[65] Antti Ylä-Jääski,et al. Folo: Latency and Quality Optimized Task Allocation in Vehicular Fog Computing , 2019, IEEE Internet of Things Journal.
[66] Per Knudsen,et al. Trajectory Generation Using Semidefinite Programming For Multi-Rotors , 2019, 2019 18th European Control Conference (ECC).
[67] Andrei Gurtov,et al. Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.
[68] Jingjing Yao,et al. QoS-Aware Power Control in Internet of Drones for Data Collection Service , 2019, IEEE Transactions on Vehicular Technology.
[69] Massimo Alioto,et al. Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff , 2019, IEEE Internet of Things Journal.
[70] Sundeep Rangan,et al. Towards 6G Networks: Use Cases and Technologies , 2019, ArXiv.
[71] Syed Ali Hassan,et al. Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[72] Emmanuel Vincent,et al. CRNN-Based Multiple DoA Estimation Using Acoustic Intensity Features for Ambisonics Recordings , 2019, IEEE Journal of Selected Topics in Signal Processing.
[73] Qingqing Wu,et al. Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.
[74] Weihua Zhuang,et al. End-to-End Delay Modeling for Embedded VNF Chains in 5G Core Networks , 2019, IEEE Internet of Things Journal.
[75] Nei Kato,et al. Multi-Hop Wireless Transmission in Multi-Band WLAN Systems: Proposal and Future Perspective , 2019, IEEE Wireless Communications.
[76] Mugen Peng,et al. Recent Advances of Edge Cache in Radio Access Networks for Internet of Things: Techniques, Performances, and Challenges , 2019, IEEE Internet of Things Journal.
[77] Chunxiao Jiang,et al. Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks , 2019, IEEE Communications Surveys & Tutorials.
[78] Dong Wang,et al. A Survey of Optimization Approaches for Wireless Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[79] Yichen Wang,et al. A Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks: A Statistical Queueing Analysis Approach , 2019, IEEE Transactions on Wireless Communications.
[80] Halil Yetgin,et al. Machine Learning for Wireless Link Quality Estimation: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[81] Norbert Wehn,et al. When Channel Coding Hits the Implementation Wall , 2018, 2018 IEEE 10th International Symposium on Turbo Codes & Iterative Information Processing (ISTC).
[82] Ying-Chang Liang,et al. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[83] Mohamed-Slim Alouini,et al. Spatiotemporal Model for Uplink IoT Traffic: Scheduling and Random Access Paradox , 2018, IEEE Transactions on Wireless Communications.
[84] Emil Björnson,et al. How Energy-Efficient Can a Wireless Communication System Become? , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.
[85] Abdellatif Kobbane,et al. Graph-Based Computing Resource Allocation for Mobile Blockchain , 2018, 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM).
[86] Mohamed-Slim Alouini,et al. On Optimizing VLC Networks for Downlink Multi-User Transmission: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[87] Yasir Abdelgadir Mohamed,et al. An Enhancement of Data Encryption Standards Algorithm (DES) , 2018, 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE).
[88] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[89] Yan Zhang,et al. Joint Offloading and Resource Allocation in Vehicular Edge Computing and Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[90] Jakub Marecek,et al. A Two-Step Pre-Processing for Semidefinite Programming , 2018, 2020 59th IEEE Conference on Decision and Control (CDC).
[91] Vishal Sharma,et al. A Survey on the Security of Pervasive Online Social Networks (POSNs) , 2018, J. Internet Serv. Inf. Secur..
[92] Qi Hao,et al. Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey , 2018, IEEE Communications Surveys & Tutorials.
[93] Xiaoli Xu,et al. Optimal Scheduling for Multi-Hop Video Streaming with Network Coding in Vehicular Networks , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[94] Thrasyvoulos Spyropoulos,et al. A Two-Step Chunk-Based Algorithm for Offloading Streaming Traffic Through a Vehicular Cloud , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[95] Nei Kato,et al. Space-Air-Ground Integrated Network: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[96] Soumaya Cherkaoui,et al. SDN Controller Assignment and Load Balancing with Minimum Quota of Processing Capacity , 2018, 2018 IEEE International Conference on Communications (ICC).
[97] Weihua Zhuang,et al. Traffic Offloading for Online Video Service in Vehicular Networks: A Cooperative Approach , 2018, IEEE Transactions on Vehicular Technology.
[98] Gabriel-Miro Muntean,et al. Family-Aware Pricing Strategy for Accelerating Video Dissemination over Information-Centric Vehicular Networks , 2018, 2018 IEEE International Conference on Communications (ICC).
[99] Hamed Haddadi,et al. Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[100] Abderrahim Sekkaki,et al. A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[101] Jian Yang,et al. Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network , 2018, IEEE Transactions on Information Forensics and Security.
[102] Hongke Zhang,et al. GrIMS: Green Information-Centric Multimedia Streaming Framework in Vehicular Ad Hoc Networks , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[103] Lin Chen,et al. Heterogeneous Spectrum Aggregation: Coexistence From a Queue Stability Perspective , 2018, IEEE Transactions on Wireless Communications.
[104] Jeff Reeve,et al. The Security Trade-Offs in Resource Constrained Nodes for IoT Application , 2018 .
[105] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[106] Ashwin Ashok,et al. Vehicular Cloud Computing through Dynamic Computation Offloading , 2017, Comput. Commun..
[107] Giuseppe Caire,et al. Physical-Layer Schemes for Wireless Coded Caching , 2017, IEEE Transactions on Information Theory.
[108] Antti Tölli,et al. Multi-Antenna Interference Management for Coded Caching , 2017, IEEE Transactions on Wireless Communications.
[109] Fang Ye,et al. Graph-based femtocell enhanced universal resource allocation strategy for LTE-A HetNets , 2017, 2017 Progress in Electromagnetics Research Symposium - Fall (PIERS - FALL).
[110] Qing Ling,et al. Decentralized bundle method for nonsmooth consensus optimization , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[111] Thrasyvoulos Spyropoulos,et al. Per-Chunk Caching for Video Streaming from a Vehicular Cloud , 2017, CHANTS@MOBICOM.
[112] Ursula Challita,et al. Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial , 2017, IEEE Communications Surveys & Tutorials.
[113] Halim Yanikomeroglu,et al. Efficient resource allocation for video streaming for 5G network-to-vehicle communications , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[114] Julio Hernandez-Castro,et al. No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation , 2017, IEEE Transactions on Information Forensics and Security.
[115] Nei Kato,et al. State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.
[116] Ioannis Dimitriou,et al. Stable Throughput and Delay Analysis of a Random Access Network With Queue-Aware Transmission , 2017, IEEE Transactions on Wireless Communications.
[117] Lin Cai,et al. Utility Maximization for Multimedia Data Dissemination in Large-Scale VANETs , 2017, IEEE Transactions on Mobile Computing.
[118] Zhangdui Zhong,et al. Integrity-Oriented Content Offloading in Vehicular Sensor Network , 2017, IEEE Access.
[119] Jianhua Lu,et al. Contact-Aware Optimal Resource Allocation for Mobile Data Offloading in Opportunistic Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.
[120] Nei Kato,et al. GT-QoSec: A Game-Theoretic Joint Optimization of QoS and Security for Differentiated Services in Next Generation Heterogeneous Networks , 2017, IEEE Transactions on Wireless Communications.
[121] Mohamed Grissa,et al. Location Privacy in Cognitive Radio Networks: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[122] Xuemin Shen,et al. Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.
[123] Thrasyvoulos Spyropoulos,et al. Streaming content from a vehicular cloud , 2016, CHANTS@MOBICOM.
[124] Guoqing Zhang,et al. Enabling QoE-aware mobile cloud video recording over roadside vehicular networks , 2016, China Communications.
[125] Wei Quan,et al. ICN based vehicle-to-cloud delivery for multimedia streaming in urban vehicular networks , 2016, China Communications.
[126] Yun Rui,et al. A QoE centric distributed caching approach for vehicular video streaming in cellular networks , 2016, Wirel. Commun. Mob. Comput..
[127] Xuemin Shen,et al. WhiteFi Infostation: Engineering Vehicular Media Streaming With Geolocation Database , 2016, IEEE Journal on Selected Areas in Communications.
[128] Thrasyvoulos Spyropoulos,et al. Storage on wheels: Offloading popular contents through a vehicular cloud , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[129] Marwan Krunz,et al. Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.
[130] Toni Janevski,et al. Lyapunov Optimization Framework for 5G Mobile Nodes With Multi-Homing , 2016, IEEE Communications Letters.
[131] Yadigar N. Imamverdiyev,et al. QUEUING MODEL FOR INFORMATION SECURITY MONITORING SYSTEMS , 2016 .
[132] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[133] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[134] Hao Zhou,et al. Resource allocation for scalable video streaming in highway VANET , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[135] Zhangdui Zhong,et al. MMS-MVN: a multimedia multicast scheduling method for multi-hop vehicular networks , 2015, Int. J. Ad Hoc Ubiquitous Comput..
[136] Qiang Li,et al. Kalman Filter and Its Application , 2015, 2015 8th International Conference on Intelligent Networks and Intelligent Systems (ICINIS).
[137] Alejandro Ribeiro,et al. Interior point method for dynamic constrained optimization in continuous time , 2015, 2016 American Control Conference (ACC).
[138] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[139] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[140] Stefano Paris,et al. Optimal caching of encoded data for content distribution in vehicular networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[141] Giuseppe Carlo Calafiore,et al. Lagrangian duality in 3D SLAM: Verification techniques and optimal solutions , 2015, 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[142] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[143] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[144] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[145] Javier López,et al. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet , 2014, Secur. Commun. Networks.
[146] Walid Saad,et al. Matching theory for future wireless networks: fundamentals and applications , 2014, IEEE Communications Magazine.
[147] Sung-Min Oh,et al. Interference avoidance resource allocation for D2D communication based on graph-coloring , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).
[148] Mianxiong Dong,et al. MMCD: Max-throughput and min-delay cooperative downloading for Drive-thru Internet systems , 2014, 2014 IEEE International Conference on Communications (ICC).
[149] Sébastien Bubeck,et al. Convex Optimization: Algorithms and Complexity , 2014, Found. Trends Mach. Learn..
[150] Moraru Vasile,et al. A second order-cone programming relaxation for facility location problem , 2014, 2014 International Conference on Development and Application Systems (DAS).
[151] Eduardo Rocha,et al. A Survey of Payload-Based Traffic Classification Approaches , 2014, IEEE Communications Surveys & Tutorials.
[152] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[153] Mohammad Reza Nakhai,et al. Second-order cone programming for robust downlink beamforming with imperfect CSI , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[154] Raffaele Bruno,et al. Robust and efficient data collection schemes for vehicular multimedia sensor Networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[155] P. W. Wani,et al. Hardware Implementation of Algorithm for Cryptanalysis , 2013, ArXiv.
[156] Urs Niesen,et al. Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.
[157] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[158] M. Abdallah,et al. MIMO/OFDM convex optimization applications , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[159] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[160] Noémie Floissac,et al. From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[161] Abraham O. Fapojuwo,et al. Optimal and Efficient Graph-Based Resource Allocation Algorithms for Multiservice Frame-Based OFDMA Networks , 2011, IEEE Transactions on Mobile Computing.
[162] Jing Wang,et al. Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[163] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[164] Nam P. Nguyen,et al. A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[165] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[166] Hakima Chaouchi,et al. On the Integration of LTE and Mobile WiMAX Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[167] Nick McKeown,et al. A network in a laptop: rapid prototyping for software-defined networks , 2010, Hotnets-IX.
[168] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[169] Li Na,et al. A Design and Implementation of High-Speed 3DES Algorithm System , 2009, 2009 Second International Conference on Future Information Technology and Management Engineering.
[170] Tarik Taleb,et al. Exploring the security requirements for quality of service in combined wired and wireless networks , 2009, IWCMC.
[171] Asuman E. Ozdaglar,et al. Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.
[172] Dharma P. Agrawal,et al. Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[173] Karl Henrik Johansson,et al. Subgradient methods and consensus algorithms for solving convex optimization problems , 2008, 2008 47th IEEE Conference on Decision and Control.
[174] Johnson P. Thomas,et al. Security and QoS Self-Optimization in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.
[175] Yonina C. Eldar,et al. Introduction to the Issue on Convex Optimization Methods for Signal Processing , 2007, J. Sel. Topics Signal Processing.
[176] Rajarathnam Chandramouli,et al. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[177] Wei Yu,et al. An introduction to convex optimization for communications and signal processing , 2006, IEEE Journal on Selected Areas in Communications.
[178] Valérie Gay,et al. Improving the SLA-Based Management of QoS for Secure Multimedia Services , 2005, MMNS.
[179] Wenye Wang,et al. Measuring performance impact of security protocols in wireless local area networks , 2005, 2nd International Conference on Broadband Networks, 2005..
[180] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[181] Kazuo Tanaka,et al. A multiple Lyapunov function approach to stabilization of fuzzy control systems , 2003, IEEE Trans. Fuzzy Syst..
[182] Cynthia E. Irvine,et al. Security as a dimension of quality of service in active service environments , 2001, Proceedings Third Annual International Workshop on Active Middleware Services.
[183] Cynthia E. Irvine,et al. Calculating costs for quality of security service , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[184] W.-S. Lu,et al. Semidefinite programming: a versatile tool for analysis and design of digital filters , 1999, Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.99TH8411).
[185] Jongan Park,et al. The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.
[186] Roy E. Marsten,et al. The interior-point method for linear programming , 1992, IEEE Software.
[187] Salimur Choudhury,et al. A Resource Allocation Model Based on Trust Evaluation in Multi-Cloud Environments , 2021, IEEE Access.
[188] Nei Kato,et al. Survey on Machine Learning for Intelligent End-to-End Communication Toward 6G: From Network Access, Routing to Traffic Control and Streaming Adaption , 2021, IEEE Communications Surveys & Tutorials.
[189] Ainuddin Wahid Abdul Wahab,et al. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges , 2021, IEEE Access.
[190] Lorenzo Mucchi,et al. Physical-Layer Security in 6G Networks , 2021, IEEE Open Journal of the Communications Society.
[191] Nei Kato,et al. Comprehensive Survey on Machine Learning in Vehicular Network: Technology, Applications and Challenges , 2021, IEEE Communications Surveys & Tutorials.
[192] Nirwan Ansari,et al. Leveraging Deep Reinforcement Learning for Traffic Engineering: A Survey , 2021, IEEE Communications Surveys & Tutorials.
[193] Andrei Gurtov,et al. The Roadmap to 6G Security and Privacy , 2021, IEEE Open Journal of the Communications Society.
[194] Nguyen H. Tran,et al. Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges , 2020, IEEE Access.
[195] Dushantha Nalin K. Jayakody,et al. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.
[196] Furqan Jameel,et al. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[197] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[198] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[199] Li Wang,et al. The Design of 3-DES Encryption System Using Optimizing Keys , 2019, 2019 China-Qatar International Workshop on Artificial Intelligence and Applications to Intelligent Manufacturing (AIAIM).
[200] A. Dewilde,et al. Enabling Practical Wireless Tb/s Communications with Next Generation Channel Coding , 2018 .
[201] Jianli Chen,et al. Lagrange Dual Method for Sparsity Constrained Optimization , 2018, IEEE Access.
[202] Richard Demo Souza,et al. Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime , 2016, IEEE Access.
[203] Haibo Zhou,et al. A QoE supportive distributed caching management for vehicular video streaming in cellular networks , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[204] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[205] Piming Ma,et al. Convex analysis based beamforming of decode-and-forward cooperation for improving wireless physical layer security , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).
[206] Aboubaker Lasebae,et al. Security and QoS integration for protecting service providers in hterogeneous environments , 2011 .
[207] Aboubaker Lasebae,et al. Enhancing naming and location services to support multi-homed devices in heterogeneous environments , 2011 .
[208] Fiolitakis Antonios,et al. Hardware Implementation of Triple-DES Encryption / Decryption Algorithm , 2006 .